Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
3547b5f3281f1ffaf124ac9b7dbfc6a0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3547b5f3281f1ffaf124ac9b7dbfc6a0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3547b5f3281f1ffaf124ac9b7dbfc6a0_JaffaCakes118.html
-
Size
53KB
-
MD5
3547b5f3281f1ffaf124ac9b7dbfc6a0
-
SHA1
270b9f5c4562e20ea7a8ddaa65ab0a38c5656e0f
-
SHA256
da2554fffb8f756e5d2de6844ce3aa38d63a939a969e232747f845b97f76c462
-
SHA512
6eb0f8afdca5c5879d2dad7786836b871110c70803d902454294c987b85bba6b7b2d79156078d11da76afdbc5ac560af826295e3afbefe435de9ecef57dc03b1
-
SSDEEP
1536:CkgUiIakTqGivi+PyUz5runlYi63Nj+q5VyvR0w2AzTICbbao7/t9M/dNwIUTDmA:CkgUiIakTqGivi+PyUNrunlYi63Nj+qI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 4516 msedge.exe 4516 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 1668 4516 msedge.exe 82 PID 4516 wrote to memory of 1668 4516 msedge.exe 82 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 2944 4516 msedge.exe 83 PID 4516 wrote to memory of 3448 4516 msedge.exe 84 PID 4516 wrote to memory of 3448 4516 msedge.exe 84 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85 PID 4516 wrote to memory of 1480 4516 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3547b5f3281f1ffaf124ac9b7dbfc6a0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc164b46f8,0x7ffc164b4708,0x7ffc164b47182⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14282171528887289151,4500019452518105176,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
402B
MD59275736e1da9a403fea7511a50ba83fd
SHA19d37109a43102ee8021ab1bf1d3a7e2790f727ac
SHA256db9dd6f1b93a9f8181327d02455107194659f5df4860526e3720b49b67362e87
SHA512e3492eac8ad7766f6ebe24bb6054e858bc241d22109d0fd13a4da7c3fd3ad784c6f05c9bb4655d378f05d7eebed778daacf06fe821322f901c44c1951ccc87ba
-
Filesize
6KB
MD5970d6b1a1f627660cb21058e857ae013
SHA18e4dc1c897548357fc7e6f448b992bcf27656e35
SHA256e7a5e4f517520fc65dbe888b229cc9448c3113cf7172b22dcd8a87fc4330a70d
SHA51258e477ed55a8c0a12807bcf0cad9e448090e7532743a51cdf646cfefb7ce616788cb73d5a6c1df95b6fedf0b7c5dc6a0abd6ceb1e40547d524405f194969f510
-
Filesize
6KB
MD5c743833677d476863e53a292887a0d64
SHA1c3f5a2b975f1576403616ebfee9bb38366fb43ca
SHA256477c9c3a570036a45330c7ab04445de5822f10a5664b74b7321014ce4c2f6bf6
SHA512f1a4422a1b4d9cbbc548a0fae2e16536d41d57aad9aa1015acabb1b1fdf4023930493d326c635ac5c637d03dd8fda24025928e0e8546021cbc0607e08eaa5b2d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD524ec36b0b9c4726dc04bdd2eeb8e01a5
SHA1a41763e80b175936a5de90bc0b82692513fb60fe
SHA256735bc06e1692a8e7a56b6b87e0f638a093067a19d55510b1bdf2219ab250b37e
SHA512d7e5ae9512cf3f0a773e31f6c4d3410321644080908a68dcd03433d28218ff8334684ea35a7d18c07ac84dd2ed0668869bbf03338ec8c9b9a3bd9d0655e5a9f5