Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
49b02d63868c3a57bbd0a9954f665c48_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49b02d63868c3a57bbd0a9954f665c48_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
49b02d63868c3a57bbd0a9954f665c48_JaffaCakes118.html
-
Size
16KB
-
MD5
49b02d63868c3a57bbd0a9954f665c48
-
SHA1
59ce03f3bbd7bcd81191ea894a6e5f02e77b1123
-
SHA256
2f5cf6280f05daf99230a04cba0d56e7462eb73d1af712974c9c03f7f955dcf7
-
SHA512
7b071159db5c5945a56dc31ba67d66637a2bae924a937cb79c8be999e552873c1548159711f3a67cf7b5e7b77abaef5174d2a2e429cafc4195027402b7074b49
-
SSDEEP
384:1R4VkE/UNlTxuKyBj07nDMx3becuqowSYfXRKoDC/H0Unl:1RdaBjenDMx3becrFvRVDC/H0Unl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3684 msedge.exe 3684 msedge.exe 4124 msedge.exe 4124 msedge.exe 4180 identity_helper.exe 4180 identity_helper.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4492 4124 msedge.exe 83 PID 4124 wrote to memory of 4492 4124 msedge.exe 83 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3692 4124 msedge.exe 84 PID 4124 wrote to memory of 3684 4124 msedge.exe 85 PID 4124 wrote to memory of 3684 4124 msedge.exe 85 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86 PID 4124 wrote to memory of 3188 4124 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\49b02d63868c3a57bbd0a9954f665c48_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce28e46f8,0x7ffce28e4708,0x7ffce28e47182⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15610473877309157515,13238436671203273455,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
267B
MD56f68a244b6c4ff1068fe60325364c109
SHA19dab70b8e02a2c815257f5ee6ae947c91af82a70
SHA2569176cd1662f2e2ed8db5cad7affaeae41faafe6b67d3b3cc7a7710e881fde1e7
SHA5125ac2bebddf164a47cfcc92399f2b1688c03437ffcc17710894d23ee8bea3d192f052b96dc3e7d19d4a8b8e1e01e6d1ab771b0c1c54748c893c2f5e148b963422
-
Filesize
6KB
MD52c29c5484c91d21ae9e0520e5bc31afd
SHA17c38f2d8ea2e04c1106de1aa6032ef03005219e7
SHA256800bc96a7fdd6860d8f4ef0f97c6fd52a730f98a337e6beb98291eb4f80fcd5a
SHA5123f8616e450d3430f12bb1631f40eecb4d9b6fd1c418d0799cadc8ce70c864b3267f02b5fec4a2de140038951f8476ef1eaabebfab4c2865f34da641f522ab401
-
Filesize
6KB
MD53a9e22b4aba4f0e896890f7640c62b90
SHA1cae28b70b7004f3a1a7ccf8fe64392f8626c4cc3
SHA256aea436ecf307bab584e273f2847a395293043b02faa048ffdbda263c73bb7fdc
SHA512eca468199c8c3adc3883478b3051a23f93c2534305ffcb25106c9181d816114905e29b3cddc2927319d02e838cb1881cf40b7d2c3fba2129e28616547dbfed92
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD543065741327964c152c8afd3eab164e5
SHA14bdf1dd42e521ab4868c3e1d9a424435986c200f
SHA25634673e8f1a1a7ec48139307c1b9fa83eadae74dcf8504d6d6eb47fccec0bd072
SHA5124d7a4ef27eecac1864aa23ad3fb89eb323402f6babc05bae97775f9c54c5e267bca08ecaf2f03fffcb3ab939780136e4de3d92160cd65c733d902a3ae0cb3eda