Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 13:23
Static task
static1
Behavioral task
behavioral1
Sample
4fe640035c98310f28753c4015042d49_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4fe640035c98310f28753c4015042d49_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4fe640035c98310f28753c4015042d49_JaffaCakes118.html
-
Size
4KB
-
MD5
4fe640035c98310f28753c4015042d49
-
SHA1
11b53221e6384cae14c0b6b16e6ea33ad54a9548
-
SHA256
bccc6e903070dffd126d8e54b840a7b305f86c100ce2660b4141b674051b592e
-
SHA512
f45d6c3bf544868d5485955d9772ab3bcd52dc21095dc26cf593a12943f985f991e5adfb58bb7d6114f87a5d41d5fb7fd409633837346aaca8f791bedf89bfe6
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o7cwd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 1016 msedge.exe 1016 msedge.exe 4196 identity_helper.exe 4196 identity_helper.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 3260 1016 msedge.exe 83 PID 1016 wrote to memory of 3260 1016 msedge.exe 83 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 4500 1016 msedge.exe 84 PID 1016 wrote to memory of 3964 1016 msedge.exe 85 PID 1016 wrote to memory of 3964 1016 msedge.exe 85 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86 PID 1016 wrote to memory of 4992 1016 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4fe640035c98310f28753c4015042d49_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9eb546f8,0x7ffd9eb54708,0x7ffd9eb547182⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13582357071627139265,15334866469546483992,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
292B
MD57072e3936ec89bac71d1a6a957c234f9
SHA17b55a6d4b5217a7e649a6f775667ed1a138f92f6
SHA25625814f5205bbd8fb2bed89fdbe2685bf219ae63db5d6a4ca6ef8e556688e8ef8
SHA5123f5c4d73f7b9ad782fd4fa15910df2e45e8dfa4780ecc41f3a314319c570357134f2d7eebb933e36c85442f8c14dd67c4b65d786aa04265ac4505121df2ab6d9
-
Filesize
5KB
MD55b483df072f50f0d25eb4b6edb76f59b
SHA14c33c8b4e97ec3df6d8c5f25c93a1066b8d753a1
SHA2561fa6c4115ba9b54d8a286b31d2ba2adcaa40ee5126ec769976b71f802c856508
SHA512965a5ce4a0d72a7b41730d1a19ee8784fd19048921725f541798139f2be1be1d764ac189d3ca7159c13335a1a8d23ff331b038d2acd37b579b6c97a9ab0f1cc9
-
Filesize
6KB
MD55616d410f186ea7015c123f630163f74
SHA11829a94bc2093dd682a9102d378575f30e6ba431
SHA256df25b6ce42f8608046b1a89e1a9fd002dc55ad1d84d567c86fe20a447f3554ba
SHA512a3aa34eb74ebed5dd73cc2c846e55ae206dd6ecb227010459cc56c53e4bd6ce963ebc39691dcf304035b7ceea313f2c2ad8830605826dba3bf2cba6ba9318a27
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD57b2f7df8018c691d8e1668a386253e1c
SHA1a3447791ba4fcff069e18d678c6c1c512cd50992
SHA256ae8ebaa485d81ce9a3a36dd94195e3d8276991517f73124f6ffd7756c1826fa2
SHA5123423edac4e5088215be890ee9e109c184e898390018334c8642cad6ba2b4027750f44d434a45000f5f08d5cec39a0ba6235711efd1ee7bd0762cfe83f74bb50b