Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
4cb1e9d868c970f1b3cb943b35917dac_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4cb1e9d868c970f1b3cb943b35917dac_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4cb1e9d868c970f1b3cb943b35917dac_JaffaCakes118.html
-
Size
122KB
-
MD5
4cb1e9d868c970f1b3cb943b35917dac
-
SHA1
e17489d64c895cf23dea5ec7861fd42d9daba3f9
-
SHA256
53e7a7410327d401275c6d83b7106bf05bb0be4b8f6be1ee347d484877b97139
-
SHA512
ec11383122a9e534879e3ab54415f06ec2f9225d6cf043faa159a10f3623c62ffbd4a7e49f39e92ff7f93e999ec2b385b0cb412e6fc25175cfd0a7a87e49873a
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcz3HHAfieLog+AcZDqSoWp:swSdLt2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4040 msedge.exe 4040 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4600 4040 msedge.exe 83 PID 4040 wrote to memory of 4600 4040 msedge.exe 83 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4768 4040 msedge.exe 84 PID 4040 wrote to memory of 4912 4040 msedge.exe 85 PID 4040 wrote to memory of 4912 4040 msedge.exe 85 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86 PID 4040 wrote to memory of 1372 4040 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4cb1e9d868c970f1b3cb943b35917dac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9eb6c46f8,0x7ff9eb6c4708,0x7ff9eb6c47182⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17455323180828414135,17935355034803691589,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17455323180828414135,17935355034803691589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17455323180828414135,17935355034803691589,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17455323180828414135,17935355034803691589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17455323180828414135,17935355034803691589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17455323180828414135,17935355034803691589,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD5539b2584d568bf1b1ebf0b10bcb955e1
SHA144ad3613c72373d4f41cf2f53acbc2ae8b5d53d6
SHA25617179e6539644c6a721adc49654e4d4324d20573a0a8a828e49cf8dabc9431c7
SHA512ca390ac6bd6f38eb09c2b6678fa16697e70c200411e472d42065750838380366542c857be37a9c170dfaa09d0d8c232ccd16df0dc3239a661c282a581d6c30d6
-
Filesize
6KB
MD54990738594a0b080e853f8520246d687
SHA145f874ab7a6fecf25e47def779c53248e47b8b42
SHA25615b1d039976cfc5716f48299bd4ad6e6a3bc05b942b1d44a1659835e7df399b9
SHA51291f70967d80d28309a17e7958d65a881464d6b19b35f663b2f8122c3326865aa2ee0236c74a90aeeaa99ea62b9f67af41fd0fa9dbf9874fbc100b9455b049c7e
-
Filesize
10KB
MD50e5512fbcebeb557328c83844d3edaec
SHA1d1953c10bb03abe4a301b7f2d417be8992881bf5
SHA2567a97977852df0c7bd91c4898ec721c0e42e9f3c70456a1e205acb77342dbb375
SHA512e20fdda65dbb52cbe90512fde9cca2360d37d49ee5341c4362b24c7c7f778b2bd89db47f556877377b2757d4c4a763db6bb7620b668b33580e48fb28c9c3601d