Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
48a640035788a934528d0a58b20c8dba_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
48a640035788a934528d0a58b20c8dba_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
48a640035788a934528d0a58b20c8dba_JaffaCakes118.html
-
Size
53KB
-
MD5
48a640035788a934528d0a58b20c8dba
-
SHA1
2f54cca2f2157b4bed04abf4660460b34272b5b1
-
SHA256
149a96845648a8ec739747e9222965ce655213238817f786a7a9cb15226964aa
-
SHA512
f142fa8d8f94365f0dc5e627d1f499685bef7f83d9e457734e96abe119b180d1c25491d1778c4f995309ae032e8cf84f197efac6d35747d56dc8a65868b45b94
-
SSDEEP
1536:CkgUiIakTqGivi+PyUlrunlY963Nj+q5VyvR0w2AzTICbbkoe/t9M/dNwIUEDmD3:CkgUiIakTqGivi+PyUlrunlY963Nj+qj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 3328 msedge.exe 3328 msedge.exe 3456 identity_helper.exe 3456 identity_helper.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3328 wrote to memory of 4844 3328 msedge.exe 83 PID 3328 wrote to memory of 4844 3328 msedge.exe 83 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 932 3328 msedge.exe 84 PID 3328 wrote to memory of 1040 3328 msedge.exe 85 PID 3328 wrote to memory of 1040 3328 msedge.exe 85 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86 PID 3328 wrote to memory of 3712 3328 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\48a640035788a934528d0a58b20c8dba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff93b046f8,0x7fff93b04708,0x7fff93b047182⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18263634261517268880,7722568784360619298,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
402B
MD5b3d8baeb1d02bf54705ef1de195880cd
SHA16d903b0bd2d8f852c1d548610b87c4d9c3b2a23a
SHA256e581e18bbe285fe3d120935a393a3ab0cf74f5607b0110556d00aee4957287f6
SHA5127be003c1053086c3644fc27b7ff7ab3f919f0a59e53881132c54147406ebead549cc410799a4b3f489cc6fb80ea92c58a79c131d609f144c844173967ece8d8a
-
Filesize
6KB
MD52ea1ed20eca403ba5959e5b8bba1be7b
SHA108adffe71bba030f50dacf72f3a0053a8d1af2d5
SHA256159842dbeefc7c3cce31751395d6fc7cb54c340a105431c3f38e35152b4cc11d
SHA5129a5a5ebf3f102ccb67ef3f3b40cc8d59eb8ec2a9031bf8df1b52e938446ca1955300853f015a38a17505dba2a7419cda9020111d041a8d11f58bccef8c30dec7
-
Filesize
6KB
MD5acfb95b968d67276e5d5832d4f5036d1
SHA1dfb68d37afb94ddc4503cb3ffe2d15a2654bf8e9
SHA2564049fbce032e29440836848039ba57f5f573a3ee49cad58ed709163579195ea6
SHA512221ae7ac983a712633454de6e7f03bd3316ec02f246457f917f82e3abe14cf2ac99624b14c6ada61a28274797bcc09f1c28a6b8f13c17cacb46f48d68e5a2142
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e7da7a5e39526cad99cba05f0354354e
SHA1a1d84f35d4f0a80689906119d674bb3dfdc85bf6
SHA2560c692516134e78dc022654eb5affc934caeaaa51af9d7da6121ec629ef9b7d03
SHA5121862084fb0f6a38c55ab94620a3c30f0c9e151f0e02cd2c1f6e46612537c8e0c4c61872d1224410bf605521f81bf30a7469760929193a582e63b4cade1c06ee3