Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 11:45
Static task
static1
Behavioral task
behavioral1
Sample
4fb9c7303fcf6efcf8c5e0cdb09bc69c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4fb9c7303fcf6efcf8c5e0cdb09bc69c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4fb9c7303fcf6efcf8c5e0cdb09bc69c_JaffaCakes118.html
-
Size
20KB
-
MD5
4fb9c7303fcf6efcf8c5e0cdb09bc69c
-
SHA1
82c8bd48d3e614098dd7771b1fd71dd73e57c1a6
-
SHA256
b5f9e998d2b587ba55d81c3d9e4843c299ac123e5c69e605d2c9750ecfe95684
-
SHA512
41cc7ef39e1c42f1dc7cdf4fb1c4b78e187d5f8805012bf8d29d16b89fcff4fc917ff8269752645813397e7b3fc65cf96793e201949db11b579ffdf33d45930b
-
SSDEEP
384:EAM9vXh9Nqh0QX0t2N7Yt5BQ/R1UAiAL9X28znlHHZSmC:crd9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4908 msedge.exe 4908 msedge.exe 4264 identity_helper.exe 4264 identity_helper.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4140 4908 msedge.exe 84 PID 4908 wrote to memory of 4140 4908 msedge.exe 84 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 2720 4908 msedge.exe 85 PID 4908 wrote to memory of 4976 4908 msedge.exe 86 PID 4908 wrote to memory of 4976 4908 msedge.exe 86 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87 PID 4908 wrote to memory of 2044 4908 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4fb9c7303fcf6efcf8c5e0cdb09bc69c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa292946f8,0x7ffa29294708,0x7ffa292947182⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14420081924684127974,14453566859648174914,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5f09ab2b50e90e4ca165f9ecea613c326
SHA1d11d878c74637b9d072f2fe9f0e34651d92a5602
SHA256891dbfc27864916ac94cf7755d1333929afd92f7e93cb1286c3d031a8ffb6b3a
SHA5125f3ce3c9c7cfad083933e06bce2ae1860a6d47c6cd482edc46c9e855d239d70f409bb868567fbd89d54fb1489364844bd8b9f292cda7cbaaf8e586ebb04c196e
-
Filesize
6KB
MD5efcd33f5cda631d08203cdb933837199
SHA10afb9b122da764d002fe9a64f25cc14d564ae456
SHA2566a871a222fd21e316dec229aaa8ded98745768c2dd247fd247ada6e898187d86
SHA5120801fdaf4529ee37f3672aff4a325fdd1e9f5a4acb0028456b98742090c1727fe103296365733e3270ac30339a2eecafd2967024415f05e15dda56047d965e43
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c6e80d214266edccb8fef82ab882cdc3
SHA1b2e26acab4e03b365b691111b6b756ffbd81a686
SHA25673938edd923590938f8d529283f0bc51b5fe0f731d51f5eac6b7974275a72300
SHA512bffa399cffacf2281c0e08d63305e759aef45f9db27abadd8e5b7bbc57cc263393c1a60ce4f0bfa9d3a1803b8b90e6f9da728b6b6dd392f85153a7d964088b89