Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
48a73211de8bcc04fa307f849dd432d8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48a73211de8bcc04fa307f849dd432d8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
48a73211de8bcc04fa307f849dd432d8_JaffaCakes118.html
-
Size
316KB
-
MD5
48a73211de8bcc04fa307f849dd432d8
-
SHA1
0e5ccb8a83d1c0a49273206533d9d07272442409
-
SHA256
254ea24274f1b9bdafac35c0d977b28b072bc945801aaa4ab498ccb93e6d0cd8
-
SHA512
c80f92fd48b599f545f5c1a98dab2b794c0669b62954874c4b887cec24216806f1dd9af7e454404e5d2db8464d45253366b6ac23ff4161f04f802ea2aa9689d7
-
SSDEEP
1536:1bMjw2fMk1D3O9Pj2fcvMUHDyLAKcUlo2rteFfZqGZFkcScp:Ii2LTdru
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe 3820 msedge.exe 3820 msedge.exe 3752 identity_helper.exe 3752 identity_helper.exe 648 msedge.exe 648 msedge.exe 648 msedge.exe 648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3820 wrote to memory of 2084 3820 msedge.exe 83 PID 3820 wrote to memory of 2084 3820 msedge.exe 83 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 4904 3820 msedge.exe 84 PID 3820 wrote to memory of 3016 3820 msedge.exe 85 PID 3820 wrote to memory of 3016 3820 msedge.exe 85 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86 PID 3820 wrote to memory of 2636 3820 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\48a73211de8bcc04fa307f849dd432d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb2f846f8,0x7fffb2f84708,0x7fffb2f847182⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5753708248147059664,4774642567921656793,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
547B
MD5843e03e808ba65939aa1cec2b7d79c80
SHA103bba35115ef1858a36aafdc720a4c23c53f2654
SHA256c4029f92bcdca315937df9be8b039711ff75e11d002d30f8e70310ffbfa1a667
SHA512d2cf1ce2cab02e406801c9bd4b881bd75eebb8bcdfc4731affa21efa7b745fc116b04ed56ecf085e0f6aeabb0dae8c096ed3609555302f744f500f0cb83eafd6
-
Filesize
6KB
MD5dc8f6756f2d2c333b7ddd9c071a9129f
SHA13374a01c3696ea73e7446e999d15ee02dff41167
SHA256af9b5c9884a735d652e636dcef76f7d7b58292a0c02a69e462907ac7be7ce768
SHA51261c2f1a5a5135f306e6f2e29b8e99a1793eba9dc802842e824fe7cb721663614bbfa94298efc49406c06c4b443a615511987f39f1db37088522ee99672a0cf4c
-
Filesize
6KB
MD58f228a6011971a9c09ea51c0cb835029
SHA155165b809d5342b08b3cb96f14a916fad37cc63d
SHA2566de522052b2b18a9af2d5bad75c2d3a94810e868a744ab6b1dfa3c6c65bb8acf
SHA51267cf13fc5ffa925b9968cdb8b31e8c1bb430d74a872aec694f107085e11939bc962010678df58240386dbfba5f6c516e6111297500849aac3b36d898bc100a7d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d36fe162b5cadd5a2c4a40dcd98a3f39
SHA13b6a25334dabcbd1f2e8ddeba64f7ac25ce6fc28
SHA25676669341b34c71932e9b37e8d9909f784b445d35e478fd2c6ecf880aa207d80c
SHA5125379b81e99adcd6f410798172af9dff314e235bdc84f1fdf02a5cf404016f2c62c0617c48b63ec379e46aaf436895e95737a9fd7021e531a2be84d8ef4a56cce