Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
4738db38a9f02d6fa940fea170e7fcc6_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4738db38a9f02d6fa940fea170e7fcc6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4738db38a9f02d6fa940fea170e7fcc6_JaffaCakes118.html
-
Size
20KB
-
MD5
4738db38a9f02d6fa940fea170e7fcc6
-
SHA1
9b6d207b2214627a334993902681d4a1896e1590
-
SHA256
5adff656bfe59c92a6c813acdd2776a6879bd3106facb53970a453939772d050
-
SHA512
b0250fc995dd8f86604102c6511e66029f85fde8aaca146ca7f0aed9a194374bdc7b99853482aa9060f583d2055ff10e8a3be00baa1086e515c554a1ffbbeccb
-
SSDEEP
384:mEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEErPTEEEEEEEEEEEEEEEEEEEEEE3:nqqqqqnm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 4652 msedge.exe 4652 msedge.exe 1280 identity_helper.exe 1280 identity_helper.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4652 wrote to memory of 2116 4652 msedge.exe 83 PID 4652 wrote to memory of 2116 4652 msedge.exe 83 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1136 4652 msedge.exe 84 PID 4652 wrote to memory of 1848 4652 msedge.exe 85 PID 4652 wrote to memory of 1848 4652 msedge.exe 85 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86 PID 4652 wrote to memory of 4784 4652 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4738db38a9f02d6fa940fea170e7fcc6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa12046f8,0x7ffaa1204708,0x7ffaa12047182⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,3821893135650909936,1265632797030449888,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
6KB
MD50bf8d64d4ccbc7e91dc5e01e3b8d7428
SHA1ab2140b5df0961e9141fbfa4b18044795dae884e
SHA25698cc77ddf6213c90a0d7ac9739215a9b03bbe8a422a9d8d198eb1aaa59330c63
SHA512ffd93f1a9b3a5eaae69ecaad626d491c6852e9a361e326487a971adcd9dbe0acd7b319d5919a9651464a8bb72892d25a4e5cb3fced3926e5448d342aa13a048f
-
Filesize
6KB
MD5afcfd0958b5ad0edc03f42312f48cad8
SHA12a2e7644e8770c1a8bf4ad9fa8f124c0be04e551
SHA25663874e980a2ae2c5562c8931e8deb71e980a334eef47404882e7c395d5f09bfe
SHA512425f4309e9d0b3adaeb408f8a415af3034de21ca842ab5298e7a72cbe20a9597634fa194d88b84fcb8d4b3be3962b76d7287a29653bbd786fd8ddf306e1df534
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53e3412262b2fc4821cbccf19a25cafc7
SHA14053c62f792700db4f8f003bed177be830df825f
SHA256576fbd0e43b9760d636f0a24ede23bdfd4af5abc3806ae375d1b8953120e9407
SHA5121ca384814218dabde915704c355a2e15ce6b0f7cd283ae108d69b81cfd6cbfd0ecd8c318b9d29c5a523c5898cf3b94b9d4114399c61890c2f5ed9fbb85aad3c8