Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
4b149750acc6a9d55441e025b00f0fb9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b149750acc6a9d55441e025b00f0fb9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4b149750acc6a9d55441e025b00f0fb9_JaffaCakes118.html
-
Size
45KB
-
MD5
4b149750acc6a9d55441e025b00f0fb9
-
SHA1
e74bb6820ac76bc5ce17fcc38d93de495f945f92
-
SHA256
d36a71de67b9f5d01dab1c930bc7c4034b24dde6f5f58923d0bb9bb605272f1b
-
SHA512
40b3a07cd408f2e3381b2901fd081758c13a8c06aa48ff0424c73a1bdc558aa60c6c0008fd9e6023b8b2a3040e9e9dbcbc8c8c0fe9165e4de5fa381ad8fb38ba
-
SSDEEP
768:HbH7MHVHDDDP2h/2DA/ftZNyzGIUayp1iPwjR+h8aicFcpDeDZDBfQ+bSWc:7qDnc/yMf3Ny7GPs8JKDBfQ0SWc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1088 msedge.exe 1088 msedge.exe 2828 identity_helper.exe 2828 identity_helper.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2272 1088 msedge.exe 83 PID 1088 wrote to memory of 2272 1088 msedge.exe 83 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 4708 1088 msedge.exe 84 PID 1088 wrote to memory of 1012 1088 msedge.exe 85 PID 1088 wrote to memory of 1012 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86 PID 1088 wrote to memory of 2424 1088 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4b149750acc6a9d55441e025b00f0fb9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb4db46f8,0x7ffdb4db4708,0x7ffdb4db47182⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2512 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10201002611412191299,15767420195155904659,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD58ea3dcd6c8c1a94c428ee1e3f8909538
SHA1ebb5b7fc6aa30cae5fd63846167c0dd00f211c6f
SHA2568f5ea5f6649a7354d5f9577eba94181dcdbd874f78fb87e8dfa67db997526834
SHA51247dce9f04bcecca1a5128843fa8f59c9f0776621e662aa12381a481819216cf223c5d83586855a9bcedb7345f8014e040fc05dd801fc19d16eca7b81651e2e7d
-
Filesize
6KB
MD57650fce793bde6791d7b28d0df1b7c0c
SHA14144db3756be4afad4f9fbeca3ab391f31c3e5d5
SHA2565806a7c8a98b46b392427fd226dd03e33c14d23a54563101867c25465a34477d
SHA512e71094b852e5422a89004214ea9f1efbfbde4e4be556c072b95dc1cae1fe7885badab4b82dd50e7207a76b39bc160ed6a7658fc8edc3d38a5a213228d5ac686d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5f3d76b64cc4572bb1211c673b73985e1
SHA186c47920a190fc07e99a2c025ce7717311e9f095
SHA25629f29a8ed3b3981e9cce31d0f4cd25e522b3f45e3e95fd1d452f68dd72f6fc38
SHA512231759a744f1e787b78f07f32d94f732a1c0f16287c9c2dff555d9010556d5354a5c172b0bfd5eccca5f716fa709d83788a7c59defdc7ec1bb7806fbdc3a02dc