Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
46d47ee0dfb5cab414f009567fdb0ec9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46d47ee0dfb5cab414f009567fdb0ec9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
46d47ee0dfb5cab414f009567fdb0ec9_JaffaCakes118.html
-
Size
39KB
-
MD5
46d47ee0dfb5cab414f009567fdb0ec9
-
SHA1
cde43dabbfa582846458ceff401dbb4737ef129e
-
SHA256
d2c38880c0d812b0e096a6916231833aa75b7253ea8bf5a4f9acfe9a39fc2973
-
SHA512
739fe07168ac049b1ec8e911bdeeac53d42cf21f71b5df4638ba07e7e1234244cfc02120f1bad449a0578e2629cdf602cb9381fb02106e6268aac0530261df02
-
SSDEEP
768:JIpC5I9nC4QHdemIdCRD/J3B77qH9nBLvzIqzIqzC/C/zIqzIqzCICqzIqzLzzLO:80IxCdHdXZRD/BB77qH9nBLvtt+a/ttQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 4120 msedge.exe 4120 msedge.exe 4124 identity_helper.exe 4124 identity_helper.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3864 4120 msedge.exe 83 PID 4120 wrote to memory of 3864 4120 msedge.exe 83 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 2732 4120 msedge.exe 84 PID 4120 wrote to memory of 3180 4120 msedge.exe 85 PID 4120 wrote to memory of 3180 4120 msedge.exe 85 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86 PID 4120 wrote to memory of 4916 4120 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\46d47ee0dfb5cab414f009567fdb0ec9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ca46f8,0x7ff9b8ca4708,0x7ff9b8ca47182⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,4061628704273207382,12189161872658727074,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
6KB
MD56c01cd8114e5dd41ecaa76d6e66cf9c5
SHA16e1b4b98f8481594294ff8f492c4aa3ba1aa1f24
SHA2560023d71716a160fcd54f7e92e3556f136e113cf27e440b62751fb42a37f379ff
SHA51206c7e0a462cd3b40ed7da2e065661a5e3debdfee3fbb8f1166d4d603dac1c6ca5f071c95ac145b3a8421625dfb46f32e6280eac4dcd4970a2092a13eab136c7d
-
Filesize
6KB
MD5b89fcabebf2abd316ce67c1f1ca2e9d4
SHA1827b9fe4bf6a11e73c7fbbf1b0bbace6d377c53d
SHA256b830bb22998adf24ab6b2c67cf0f265c20c23da8ad416307426aa616011a1ec1
SHA512c3aa30a91355bb1b8de49d630826521200cec09c9abd9121b2ed49208e5e4046ea2b444b343db56619daafcb22b583efe8e65afcb3961458b373a1e420419cf1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD501de31ec87e6a3afcef9062b3c8e15f9
SHA1c7cf1e6031eec6ecfc49ac5597c44ff5edb36932
SHA256a95f23043b16f3db9790f59a12e592da8df40d6e9ceab064ded33e9afbd63d66
SHA5126409eed4da21c215cbe088d29c2ac755b1e91b785d857c7f52068f77b74b2fe701aa80354bce768bee14f3d5e5290f0a798c88c3a00ad70258d2655393874802