Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
4ab30f2d2bddde4ac43cc60e18ab169c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4ab30f2d2bddde4ac43cc60e18ab169c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4ab30f2d2bddde4ac43cc60e18ab169c_JaffaCakes118.html
-
Size
78KB
-
MD5
4ab30f2d2bddde4ac43cc60e18ab169c
-
SHA1
af7673deb9d27b1726dcd5c8be211c9b93d822ed
-
SHA256
10e7faeaf7733ac21ad3e317bdcab6cda12109a7f08a12ea0952e8416f762585
-
SHA512
21a9c9a01a81c3ab80526029735ea78304ec341f0bc3f62272f6056007cb93afe63504cd102d180301ae1e56c59e287803051f8594917dfffee014b6208dd2d3
-
SSDEEP
768:Cbh7ye2sH/MXgyjCKoBfuS/7FxIuKzNyGsaMWxS+uOI+V:CbhxbFCIa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2920 msedge.exe 2920 msedge.exe 60 identity_helper.exe 60 identity_helper.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 4660 2920 msedge.exe 83 PID 2920 wrote to memory of 4660 2920 msedge.exe 83 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2844 2920 msedge.exe 84 PID 2920 wrote to memory of 2544 2920 msedge.exe 85 PID 2920 wrote to memory of 2544 2920 msedge.exe 85 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86 PID 2920 wrote to memory of 4132 2920 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4ab30f2d2bddde4ac43cc60e18ab169c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc883446f8,0x7ffc88344708,0x7ffc883447182⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2988 /prefetch:82⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1296 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1324 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,1397057604092143639,8464511727488186164,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1400 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
192B
MD50b7181a0c3a32055898b296a0eecbcba
SHA1d6da6b05720dfc6bcd19dc595a7743558ad81f64
SHA256f5c1971241b869140ecc6d339b92b861e4efcf3d32e041b583d3683a08ff2112
SHA512691d613b292b9886783f48e5b8cc7a78678df2e7f09928132ff8126e57b9a1e315a3f2bceaf2d737212630b089c99e25848b0a4e4fc1d6db510bfa387cd5044e
-
Filesize
6KB
MD522064e752fc8f59efb5dcbd6b54412f3
SHA15dfb284e9355a7c8625f8b1aea0150485e38fff5
SHA2560ded832726d7bf739cd2b03ce96d17b6729ba4817a622de2e31c137e98cc507c
SHA512f50fd5c2b9ced69b51c153e0510ce9688fd5a7603b8a819913e834a613b3d1e1be11ea068c7824d0de31bc4bea519a038d756b276c384427be5dd9ebe48d233b
-
Filesize
6KB
MD557331f2b3cb74f3cfd91e9fa794b6c60
SHA183f74bbcb0d2f31199d33c3c2adc78f0263ad6f6
SHA256ab044f35a40b88671a5e6882a76de2ed4c3dbc42410527de5368569e962527d2
SHA512f2da82730a6c0e61e5693e89bb5e7f749773728328541dc77380f5c6ae73535fbdfc36fe8b1a0fb9196ae81e1ddd3e209238606a270368f2526302271481a791
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bd63b3f0-8389-49c6-aec5-e9235db8954a.tmp
Filesize6KB
MD5b5bfb18f22b01d8c7967e19246a30873
SHA1514ada961e879bb7e1657c841d27c69168e9d679
SHA256c1384cdf50736fa42d01528533c47b939c4ae72465ef8a8e4eb15589eda5ca30
SHA5127228acb25d1413368921c4dc31f9e26d040b825eff1e6de213e6a31634953b2ec802870004a60db89dd4a9fcb9758251142cec5bff557f6dd6c6336d72c2ee7c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59300608c50c73aee7afe5ed8d155be27
SHA16223665ad82bb76ccd067566c1a97ce692a1fe05
SHA256ac20a5d92b2037a0e91836795a300b8b4642480e918318dd4c650877fec5b20b
SHA512ea654d6c969300b236c6cddbd3bf493b899f6246a9b842d3d0e912060311ce9a3cd48f95be52898aaeaa4c0bd2e0e0c3634944986d685acacbfc08c62a7a77ca