Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
49c71055c624f6750be63860241b6a95_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49c71055c624f6750be63860241b6a95_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
49c71055c624f6750be63860241b6a95_JaffaCakes118.html
-
Size
12KB
-
MD5
49c71055c624f6750be63860241b6a95
-
SHA1
2301d33d803731c13bb3bdf9d35d7dc7ce061bdc
-
SHA256
148e4d6d0855d724e8dac7b41f0922c152cc8e5fe9ea26f271d05785dbfa32e7
-
SHA512
1d7ee78e67a3fe977a0976e7a06521cd3e114ec48376c12762cd7d90077a910b6dbb497a09e328cee97567e14608b549fdad00461b30bd347b802adcc3076bc9
-
SSDEEP
192:8+8agwOw8QEQOQpuWQWac2gTMD+aY19t8/UMNt:8+yDw8thqRn2uMD4TWcMt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 1968 msedge.exe 1968 msedge.exe 932 identity_helper.exe 932 identity_helper.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4312 1968 msedge.exe 83 PID 1968 wrote to memory of 4312 1968 msedge.exe 83 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 4228 1968 msedge.exe 84 PID 1968 wrote to memory of 2448 1968 msedge.exe 85 PID 1968 wrote to memory of 2448 1968 msedge.exe 85 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86 PID 1968 wrote to memory of 4924 1968 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\49c71055c624f6750be63860241b6a95_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa813146f8,0x7ffa81314708,0x7ffa813147182⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13597419015292339320,9768137086393077577,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\86eb12db-c2d9-4c1a-82ce-8e04abe7dee8.tmp
Filesize6KB
MD581a70bbcc9c9b392a2a90b9d560a6b8a
SHA1633264a27d19f985068f709d9cf925df00ec8029
SHA25690783ff320d0f8a094662e147d6b0945d3a43d16a4a15ae7377a472ca6e29810
SHA512822e6e228fe2edaec8d5d6ea64c02a286ac3dc9c15845ccbddbbb1e2a6b7078b1d705df4ce789561590f84913f44ccaf148d2150b3f6564bdb97bc0d9964223f
-
Filesize
254B
MD51a8fe9f147a69bd06463dbafcdaf0749
SHA1262b010f959e7e1ee2ae0b5e06130ac23ec098cd
SHA256cc3455281928f695fe2ddb848d8c514c776ccb427b2eb10d6a5f7865d975a8c6
SHA512d5267f8001449637788f771d86c95fe0885b216d48585d5df5b5a8b38828547e5ec9f1580474c3e93fa428b7cedb7c5a85ff731a872665c4cb90a18341ec6ec7
-
Filesize
6KB
MD5f5b307365a7b32dc208abdcf97cfc071
SHA10f6d1ff0c826080de0e005e8c4057ecf6337a43f
SHA256c6123abf054c5daefd1dd51526f14ee24d369902afd519d5993fef4682006ed9
SHA5122c6596dafb66bfa275a271d9c5c4ffbb9728f456421bb147187d0391bb0e8ca30cfbfc86920766793c6b0316c397bce845eef7b02e20e29f8cc79fa9b4cf9110
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD523f4cb8dae139b939130ccaee637ef50
SHA1f24f4639194389df45dd6d164b55631666fd2baf
SHA2568422ea7706935d455c4d765999e921490ed1fcfd3a5bd9449a7b8d5911e8dc73
SHA51283906d5e9f35cf1baa274fbbe61e2350c9fb2f0fdd300fdc45a54a3d29d3fcd6c1dcafeae5fa12dc5c8276a249704c9b17d205171c7cbb68fb446566ffbb1de0