Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
4ff3000edf7f2b922bb8c64828afca86_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4ff3000edf7f2b922bb8c64828afca86_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4ff3000edf7f2b922bb8c64828afca86_JaffaCakes118.html
-
Size
137KB
-
MD5
4ff3000edf7f2b922bb8c64828afca86
-
SHA1
22f210395c1588bd9a291db46a5ff5d23529e881
-
SHA256
2f4d07b7e51968275b5a1e403453ab71c8b075bfbedb94f3ad5a8090287f7f22
-
SHA512
d6a39ec7a72e0f3ba0cd97625ec9b80516a32defe9304fad8ef8e707df181d30542ed0793f14f7df0f8e91811dcba544bf0e5622a41287ed002d84e6634f8d3b
-
SSDEEP
1536:SJUiyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCd:S+iyfkMY+BES09JXAnyrZalI+Y3FWI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 4920 msedge.exe 4920 msedge.exe 4012 identity_helper.exe 4012 identity_helper.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4044 4920 msedge.exe 82 PID 4920 wrote to memory of 4044 4920 msedge.exe 82 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1480 4920 msedge.exe 85 PID 4920 wrote to memory of 1008 4920 msedge.exe 86 PID 4920 wrote to memory of 1008 4920 msedge.exe 86 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87 PID 4920 wrote to memory of 4120 4920 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4ff3000edf7f2b922bb8c64828afca86_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffaf0346f8,0x7fffaf034708,0x7fffaf0347182⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2976 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15348467235453443789,7315805387235294010,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5b7cc6ebfced4d198aad08dbe59e724f3
SHA1de5228dac1360fbd07483cee92eb63436f3652e3
SHA25671b46cd34eb07d8333c87693d370843d89396d1b14926173383f779ebbf55bc6
SHA512dbb9807a3acf6a91779318703b01c16b2c555c59468d1cfea2d6436bdcba6b74f5c551872dbd3a3a6cc29c0f414517c3a4c633fb9a6c731d4e0b8e9d3ae60b02
-
Filesize
323B
MD5030101d9878e9abd02c076089657149a
SHA1eb9b83a6c3d79ec77087925612706b92582726e4
SHA2566e692b3082d2189af055d4b3d4fc809a21d84dcc7a97b9a9bd1158077867e402
SHA51237fbe6df5954089f3390f69c24466536f1ccf7336ea8309429af46358d2ee8ecb407edb33a7110b2da86c1131d72fce6b15daef2b423c6cf1b7070f10d37c8ce
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD52ff1a9b8d632ac7c9e8ef2b967db29dd
SHA106a0ec27680aa55612e0df96fb755fee2a3eed49
SHA2569824b05b09f63015440ea4f6e742360cb00b4ca8d0cf119758ce629e969adf9c
SHA512c56d76e86e3ad926edd12c9f90bafc0896a62b49a6bfec82eba616063c79f410432ebdc06c25031cf4488f4a360ccfa6b2ae6f42a78bc57a946f8c2817499336
-
Filesize
6KB
MD549612422e49f26c6b9ddd708d0a6341d
SHA1fe93c5dc5ff20d4bb4337c54ef56568d406b4ca9
SHA2562279220ab247a95d41a92628b21e94debdf31b0f3ed84a83c30f9be0945f00bb
SHA51225fb0bcef1db718d11c72c67b178efd5657f6d0d475e86167afdf54f50c703a213a9b4ed465bc02faa318aa7194dff00848e532298866fcfebd62d2d76d25f1e
-
Filesize
6KB
MD5acf759815719477b656d028661b18bda
SHA1bb38e7fa8a1e7bd89ee51e0a3188d7c5db3f63cc
SHA25699d6838291e479482dd935b21fcb1d9b71d611e8f2b087c0edfd99caffe1ac9b
SHA512c1dda373f2e2248c4c6917fba693ca5fa54cd89ad8b658db908a9e84edbc256dc5026cdd266a89e1a8da0f4527fe62f2ba864a44656d279f03c103215ee1d0b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56478d89aec6d5812df9dc3797c892d4f
SHA1c6d1df069604f2f2e923df5c5cd869353354d6ef
SHA2569dcfc7209624eb7f8e28f376c0e2ab0e4e0d11e2efe321e950d6315903a3662e
SHA5122a9e99a3de2daf82f91fb21271897698a5305825863e55b1d16594a21a48515054cb3bc0cf76141107980a5db5174ae7c2de2d56b593debb98421fb657e4662a