Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
48ec9b978df7521172da469cd4e05366_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48ec9b978df7521172da469cd4e05366_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
48ec9b978df7521172da469cd4e05366_JaffaCakes118.html
-
Size
6KB
-
MD5
48ec9b978df7521172da469cd4e05366
-
SHA1
ab520b149f36b665a38d3f42459c5b79bf33e5d4
-
SHA256
d0ae016222d7ebb3d9cfd2d03a1f265c397bc63296562cbdc02a1caedbe52f1d
-
SHA512
ae62571ec5b52b61fdf0c6b89148fff39435622b2bd8b797145c88f54c6a4323f22658984a35b4d0a066abc878951e458ab1b408bfcce6e0240ec510c0cfe6ff
-
SSDEEP
96:uzVs+ux7qgLLY1k9o84d12ef7CSTU5KZcEZ7ru7f:csz7qgAYS/bb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 216 msedge.exe 216 msedge.exe 3608 identity_helper.exe 3608 identity_helper.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 3304 216 msedge.exe 83 PID 216 wrote to memory of 3304 216 msedge.exe 83 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3648 216 msedge.exe 84 PID 216 wrote to memory of 3708 216 msedge.exe 85 PID 216 wrote to memory of 3708 216 msedge.exe 85 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86 PID 216 wrote to memory of 800 216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\48ec9b978df7521172da469cd4e05366_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1a3346f8,0x7ffe1a334708,0x7ffe1a3347182⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 /prefetch:82⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3731763642237539555,12338574765439209117,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
6KB
MD5d39b94f071354e2dc8901f6585ae3e87
SHA11093b5bec56eae03c31b7b5372954469f586f754
SHA25645bf51539f0b68a94eddb18c71d86fe1ecd997aaa24663a532a6b9110ea62bb1
SHA512be434e9efad45798d4649bbe7d75367e5e7a07d03662d14904c40e380f0ce8cd9d9f2449174b7bdb0f9f1cc6c25335d0c8a22e4dc565c60904ef04f96438f0c9
-
Filesize
6KB
MD5728b3207a7400201c4c34f1029bef4f4
SHA13b8f1785ddef982f861e83f108748e3af3a95722
SHA2561ff6054486117e1aaeeaac4b7be8fc15b6bef47b3c3c284d5b5e77fb09dd5df5
SHA5128e4e51d75fa06bb3d8515db81a96ab08885c5428dcadebae379adec3c1604250f51ac78c6ee1df23af112ca42f80f12055d7091654a4c3b899aee51482407af2
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d68aa2157768a91fea28b0dbc6c35737
SHA1219ad6af0b3ff07dc2322f7e1326e3501caf80ee
SHA2561e8605b7ef7d1269371b6dcca445191d596481692202940064f2a174cfa8971f
SHA5125fd4c64aed7a4b075b690ce6a23bbee31629520bb9333e6b71683ade45d5c4d4f6814157d791ab8fd556f65c0507ff672aeccd7863490c65d53668b1e13b0450