Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
4fc5f6dabc0296f97efb17dffeca609c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4fc5f6dabc0296f97efb17dffeca609c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4fc5f6dabc0296f97efb17dffeca609c_JaffaCakes118.html
-
Size
62KB
-
MD5
4fc5f6dabc0296f97efb17dffeca609c
-
SHA1
3549cae3be93c559b4276459082698b9e954bfdd
-
SHA256
110c5b07b425c8fa51a0d7448eebc245424013f9c5964d82ea4512e318aa0651
-
SHA512
1028f747db9d2ee667e394e5b2507d79edb07089779592f39f5d11b488a52203a3db8587fdb3d1da0bbdcb122e2a7fb5a4eec1b51007ce9cc650d4d724f94a70
-
SSDEEP
384:SfwllFFN99N9i/T348dE+S8O61MlWUCetAAjWJw/RGtHMcetjPeB7/pQxHFPtYw3:Svr4b8O62sG801u7QxH4fVKhi5CVjl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 1788 msedge.exe 1788 msedge.exe 2732 identity_helper.exe 2732 identity_helper.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2804 1788 msedge.exe 82 PID 1788 wrote to memory of 2804 1788 msedge.exe 82 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 83 PID 1788 wrote to memory of 2724 1788 msedge.exe 84 PID 1788 wrote to memory of 2724 1788 msedge.exe 84 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85 PID 1788 wrote to memory of 2224 1788 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4fc5f6dabc0296f97efb17dffeca609c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9cb046f8,0x7fff9cb04708,0x7fff9cb047182⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2120 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9010558639698079984,4070451428029630934,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5544 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD505c14ae64592aa02cd7d474b025e1e33
SHA17cf2446e03b558ad4219afea9ab9b828c9806db6
SHA2564d14fd830a46c5035e06f7c54e961497246555a67720b153fa361aaa5820c63e
SHA512281be10c06daeea65bc2532c795174eb7d6906fcffad81e63b03bcafa79fa21682053b9d3f3c73dfef2b763571f877d233010fdbee8ccae999d7c486de3a4051
-
Filesize
6KB
MD581d004b4942f8a214c38af4be94665df
SHA1aceed982aca8256af02c235c860d9bb3a1bb1fff
SHA256c996473524e5ecb1c7cf7fc3d12ef6aec3ec2618b92e04352cc27cc3d5bf66f0
SHA5120a227533bb375fcf80746e1c499abefe430a7d87710ee1647e3d14609ee5a04d9e3ae09599328581f24af486fa8638ed0f76fff3b734285f98a160d7c67c018b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f8bb4f87ee165e2a4f70a1cb175f21a7
SHA149bc4983a297eaa1711004a683d2661d60dcda67
SHA25651e51232dd8d2e196cc0d6ac02e3433a21d3045d7a8ab57b271f0088d0b74e54
SHA51257a7ededd9aa5fea87c04ab83e6aaeb2afbce7f837ca41311e4eddc38677fef74d676f9df5b18f0561b4454267e541df577f24447ac1e1387ea13d080bbb756d