Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
4aea1763eb8132c74d764e6efc3ba7ba_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4aea1763eb8132c74d764e6efc3ba7ba_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4aea1763eb8132c74d764e6efc3ba7ba_JaffaCakes118.html
-
Size
35KB
-
MD5
4aea1763eb8132c74d764e6efc3ba7ba
-
SHA1
ea3091bda2e8dad9cd9e4f9549c94f984316dde3
-
SHA256
910c4b81771d852301249c9bcb9c504d2b7fffafbbbcbf552e18cb32fbfce227
-
SHA512
195beb90bd79ffd6c683aa0196cd634ca76b807f6ceb4352c7365c2b5e275c061c47da60e936da8c03fa7751c9c5d95de2df0663970946b99c6574a4fb0463d7
-
SSDEEP
384:EMxjtGeBssdbWWGUjDNvxvRc98RWCehVa668:lxIeesJvrnvR889e/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5788 msedge.exe 5788 msedge.exe 5148 msedge.exe 5148 msedge.exe 1812 identity_helper.exe 1812 identity_helper.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5148 wrote to memory of 1200 5148 msedge.exe 86 PID 5148 wrote to memory of 1200 5148 msedge.exe 86 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5708 5148 msedge.exe 87 PID 5148 wrote to memory of 5788 5148 msedge.exe 88 PID 5148 wrote to memory of 5788 5148 msedge.exe 88 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89 PID 5148 wrote to memory of 1916 5148 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4aea1763eb8132c74d764e6efc3ba7ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbe1d46f8,0x7ffbbe1d4708,0x7ffbbe1d47182⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,586377180551011994,10358375916651421051,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
6KB
MD5547327f8bd36bd24f1d056b3bc1cd92b
SHA1072fa60cd0a70baa2ba43bda8632ac93d76f59f5
SHA2567fa679dc22aaf76a4e436f9ca062b965ee18ab3256a18d714ab33f972321dc92
SHA512795f3944685b4a157ac6de09159dbcd1efe0a4f253d2b86e09cbe1496aad97f84fc7159f244ff2e67a1a817b485037d4d3edb1c3007ea5a5bf4c596a0763d9b7
-
Filesize
6KB
MD5cea2ce22b22f93bc4d5c7f4b2d9b6b3c
SHA1819e835edd3a6291479ab7001542afe2954b51a1
SHA256cd0f80c0d07d0309ac1b9130bdb8c323c502805fc32e1ef0b4bf8dfacd3cb85a
SHA5124ca4364027bde5d4239ba55ff9eef0bdd591d255dd3351e5d19288c0ee011c9642e86e5213a328a2820f107636d5af5f655f826fe0b175071827197473c7a943
-
Filesize
6KB
MD55e703a7b2d14a22ed59496636eac5078
SHA1717a93dcf24b024ccc2b09b90b10eb3dbc1bd4da
SHA25681235353f3a8508c7481c92b481aab0af91fb8c6ead04c9fbf507a517312e3f6
SHA5128a6ec36dab9e0d481cac98ca10383eb2165073b6c19c2dfb7c0b7e581a686763564ceb97c13dbb3e94022a6ba472cd5c20f541410bf85ab3a40ba526ed07d664
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5c7963e0d4a41c9342823b177d2434751
SHA199fc7ca4fec31d1f5dbd72d0761012c45181da26
SHA2560588f58d8335204857c3a9307c854dcc49fa96f44d69903cf0593f644437b5a6
SHA51279831d855e5552e04924ea4ae5c2ab4a5e1fa95efad77f3c30df0601cd45d3d0c4a8cb082241a97d3c57159aecfdc1fbf794e9b263a7a8643d117649d3932290