Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
4b83265a91d255a73714f9bcc8208282_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b83265a91d255a73714f9bcc8208282_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4b83265a91d255a73714f9bcc8208282_JaffaCakes118.html
-
Size
92B
-
MD5
4b83265a91d255a73714f9bcc8208282
-
SHA1
8ecb8d84d4be2256f1816489f7ae49aa57278476
-
SHA256
2a77135c2b50a2ab7592c1c87ab4c191470139da8976e377f75d9d0f8afb34e3
-
SHA512
6f317ec77ae539a2b5233251cb14876d3220dd06c7d3f09ef00e08d8376b135eba19b9abd4a9d32bc222ae2c4fabbdaed20206f0c4ae9ec31ac536b8d910e747
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 1468 msedge.exe 1468 msedge.exe 3484 identity_helper.exe 3484 identity_helper.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 2260 1468 msedge.exe 83 PID 1468 wrote to memory of 2260 1468 msedge.exe 83 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 4248 1468 msedge.exe 84 PID 1468 wrote to memory of 2888 1468 msedge.exe 85 PID 1468 wrote to memory of 2888 1468 msedge.exe 85 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86 PID 1468 wrote to memory of 408 1468 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4b83265a91d255a73714f9bcc8208282_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc10a946f8,0x7ffc10a94708,0x7ffc10a947182⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2112 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1768,9137122026649358074,18194526520479166663,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3584 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
6KB
MD554c13c122a98a696d4a0a9e40450df7c
SHA155a1e6157a257f11a2417e64ee03b9bf53b211e4
SHA25661128cee17c3e6397caed9a235b213437a7a7ce4a4e2a21bc47a545acb495d61
SHA5125f83b9e8ad26b01a6ab9e7143c674db2368f6158b8e309f021c8db8753ed6d16de05b9a0c4b67f1cce9cd36d5c70de25b757534a085ba052669edf21fe54d385
-
Filesize
6KB
MD5c0de8b16c54f60a8ba3dec24c184f953
SHA16166452c22e0884f700ac6a85817c48d8106116a
SHA256fe170955666767893da90096532bef784efd632e01e86a43d5f7bf3ef2a18e20
SHA5124891bd3c6f31e64f702e98fca1e52e80a611c3c876255c2dd279e375d83977985e8a958f50fa7fcc5f66be30238cd527b118b3b7d79725adefd49fcd7455f1d2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55d90434b6af90e231e9edfd4e011600c
SHA1529bcb873132916482c0362f8f686e69cce0b2f4
SHA256e71308e172a4a9dd03f3e185238cd5931fe1970ea44ba11b0efc9774572a2af1
SHA512aaa975e497fcf35a314ca60a2e4b991abfcbe1cdee431b0b0ad1558cc39ab8a7aaee156db4474978ee01055fb6902852646c8905e4e6497d11131939dafa1042