Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
b46d9ef3bc251c9b061e0a0804a6bae0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b46d9ef3bc251c9b061e0a0804a6bae0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b46d9ef3bc251c9b061e0a0804a6bae0_JaffaCakes118.html
-
Size
24KB
-
MD5
b46d9ef3bc251c9b061e0a0804a6bae0
-
SHA1
3c5f00dfab3267c955c044a7af09fb07cb5dd690
-
SHA256
093a410147c402e2f7e119e3aecc5a9a0d5c19963d116be2bbac770904d12143
-
SHA512
18fb4cdde17f8b1cba681acf0494696b68ec4b0c178dd93892a3d6c12dca23fd40c937e07f26d3657b9ce1f76961e5603cdde1e015bbe5170093a0d794c2c8e9
-
SSDEEP
384:+4C9ynGqmLfmWGG8XsFDpVFdDlxsh9A8OxQNVLwil/xD+cNWZdYRG0xxZ7x1:+4CEGqSfSgVFKbVLLzVNWZcxxZ7x1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 4048 msedge.exe 4048 msedge.exe 2476 identity_helper.exe 2476 identity_helper.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4048 wrote to memory of 2448 4048 msedge.exe 81 PID 4048 wrote to memory of 2448 4048 msedge.exe 81 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 2416 4048 msedge.exe 82 PID 4048 wrote to memory of 1988 4048 msedge.exe 83 PID 4048 wrote to memory of 1988 4048 msedge.exe 83 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84 PID 4048 wrote to memory of 3708 4048 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b46d9ef3bc251c9b061e0a0804a6bae0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf15a46f8,0x7ffbf15a4708,0x7ffbf15a47182⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4300 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1320502721830350223,17093111404448276226,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
6KB
MD564e326325d68fca0da5399ba49f97217
SHA1c17aaa5043d75849b678e09b321479fcb95b4c7f
SHA256a69c3dd30705ca95a4ed959546d9acda83bb8b6d9f5906890de88ad3bef4af7d
SHA512bedcf0d40721d26b2eab429b2eb0e1503a32d6b980bb382870dd33e9774402ba314444f1662a931e79c0d7cb6bf2d2d7cea15f499086117302cdd0d13169643c
-
Filesize
6KB
MD50f08d78fa864ab9dd4e1daf6433b7ea1
SHA1a73234e935615c3f07d4e0947cc092ca482809b7
SHA25687e96f4477299c9f6ca89a791b5fd50a818ff12ddf5bfa476b7051d1db1e8600
SHA5124ed3bba3f79bd010a9d7bc8ccc7af624748891e0eb41fddccac3b0f8f2ec39832dd54792aef90491eb9dea76e34de7c07e3fe1db36f23f70fc09dbdd8868adb9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5062b264ee2bced7c8682ff390c997a5e
SHA128d9d12fe5b5c35932233356db0db76dcd807fc6
SHA2567ee810ec5d986f8b2428527ee530e4c77938fcf177dbaad22f5fd4b866f84755
SHA51225d9192a6412b00b6bb28974e6f3e1a5f164f9d59e716ec4d79bbb68fa65a580d60877713b6ed7ca701ea6f5be958456143e50c1c2bda8413f960035c7cce4f6