Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
4a5e09866b7fe06a36956cbe4cc3820d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a5e09866b7fe06a36956cbe4cc3820d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4a5e09866b7fe06a36956cbe4cc3820d_JaffaCakes118.html
-
Size
120KB
-
MD5
4a5e09866b7fe06a36956cbe4cc3820d
-
SHA1
d81e3d4d0b1d8f74b1fc6d546754ee55544a7684
-
SHA256
58f2e1801fe46e8c4e722cd47fedf8d5635400334b3288b67685756f90cf04b5
-
SHA512
3584ad4f476a2667022e2a46a5c6a4181215429274edbb4bef1c2de395ed0e1bb10d9c538666a92e87c30f59728f35682ce174f651a056b550a4655e8f74fb4b
-
SSDEEP
768:Exi/nfV87lvSXhOvHT/uYxH6YqM5BcJnCQtWVEIL3Y7HnLEKRyMnotrrz:EAfMeI7/usHewuxtClo7HnLxyM8z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 2608 msedge.exe 2608 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2608 wrote to memory of 3656 2608 msedge.exe 85 PID 2608 wrote to memory of 3656 2608 msedge.exe 85 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 3532 2608 msedge.exe 86 PID 2608 wrote to memory of 1040 2608 msedge.exe 87 PID 2608 wrote to memory of 1040 2608 msedge.exe 87 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88 PID 2608 wrote to memory of 2684 2608 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a5e09866b7fe06a36956cbe4cc3820d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fa8a46f8,0x7ff9fa8a4708,0x7ff9fa8a47182⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,9387025552440417696,16891427703760988997,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,9387025552440417696,16891427703760988997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,9387025552440417696,16891427703760988997,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9387025552440417696,16891427703760988997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9387025552440417696,16891427703760988997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9387025552440417696,16891427703760988997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9387025552440417696,16891427703760988997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9387025552440417696,16891427703760988997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,9387025552440417696,16891427703760988997,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
6KB
MD52a3d0b64ec14968447e0f0e8f3c15c38
SHA100d398c87827159c27497ad4e09003a419a9bab9
SHA25621a333e22d992f78db086d84e413d7258441b0147db6b4cbcec1ba8e53b214cf
SHA512b58d1044232930fba2c0ffab10f061974edde33b2fe7797507b7d7d40e66e3033824ea919315d0e4aa7db8c5917c29d6424cf1b1e89df34f9e8398a7ca34e53f
-
Filesize
6KB
MD595c9f4ab3c332d1deb17da33b42625ed
SHA1d09775601a5c79f9ff74b057b212fd7e6202268b
SHA256381ebe43e6c47cea617f32cb1e1cec3cddb84f5ac355dc01479be8bad6d40698
SHA5123b9aa71da7677be2576def4aeccd6ddcd73a5397c6be45acb14445a15eecb4104a340d108f1b55e50c418f09ae3f887bf66e2cdc9d94ce4d838fcd8cf198304b
-
Filesize
10KB
MD57b324f02f64c87887c5dfc64934fd41c
SHA1cbc954aab50f050a81f2ea628418be6d4608cd15
SHA256a06b347c5032cc8e6173e05de1d55df88a0ca91d82fce39244addbac2e94452b
SHA512cac41f2fa71def9a1fdba503f54f24e546971bdd12a4057104b93c1fe71b927978d391924e0ff08f90a52a9a212ecc0e32b760cc9d9e8c1b2d6018ca74a10a07