Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
4cd9d3901283fbb5c318641f9435f40c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4cd9d3901283fbb5c318641f9435f40c_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
4cd9d3901283fbb5c318641f9435f40c_JaffaCakes118.html
-
Size
69KB
-
MD5
4cd9d3901283fbb5c318641f9435f40c
-
SHA1
b9b073227aa938688ce4f20fd6f677254fa726dc
-
SHA256
ae2851504064be0c44f3a38ed6982fa4cac783e960af1d5008bbbd0ce3df97e3
-
SHA512
a1c702ddecc3e6d4840f20b0043123f64ce94aa953e5b058ea3cfcfd9e84a83d6486f80ee8c1f06dbb05318739fc1c9ade4d8251c2e792081f408ec64585e4c6
-
SSDEEP
1536:H1bwnHQrku6MZB5Z+ymrzADmJ14oX0ghNxgefN3MU39DMglNJfXUJf:RMwrkuNm3lJ14oEgeefR9DtCJf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 4308 msedge.exe 4308 msedge.exe 2692 identity_helper.exe 2692 identity_helper.exe 508 msedge.exe 508 msedge.exe 508 msedge.exe 508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4308 wrote to memory of 3160 4308 msedge.exe 85 PID 4308 wrote to memory of 3160 4308 msedge.exe 85 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1012 4308 msedge.exe 86 PID 4308 wrote to memory of 1812 4308 msedge.exe 87 PID 4308 wrote to memory of 1812 4308 msedge.exe 87 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88 PID 4308 wrote to memory of 1420 4308 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4cd9d3901283fbb5c318641f9435f40c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb54f46f8,0x7ffdb54f4708,0x7ffdb54f47182⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1510213779379866130,16558381496681518025,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
Filesize
394B
MD54299603c9910c799ab86056c3344bdf8
SHA1b1433a603fd0e2287d905b5bfc1eba749ceee7f6
SHA25639823d023aa3516de925387e2eae44be9516e6b6704185198787f2423ec6869f
SHA5123be05b2e72acbc3708350dd387e6620b89fd24fea4504cbe04207ede57e2c443c38c291bc464ce38f69e17d88297f208081c6bf9119be76fa9bd2b4093afbbc8
-
Filesize
6KB
MD52a166de22853269faebb23956f6a2798
SHA117a229a957d0f9552952e8cd6e6d93b8b79928c6
SHA25641bc31055e9b4ab67f6178d5377dbf3afc15faa9f84ac975c08caced325b6ee3
SHA51204eb2a1ff1e4a5e7bbdeaa0744d363aa79fb787a9ac01279c99f926da521632673fc56b6f8d28c9e7e297054c1c2dbf56e10dd5ac1265e114d1ef12dad6e934d
-
Filesize
6KB
MD5348e0087ed98d8d187cb8b3de323f822
SHA1dc55743e2bd4f877eaf16959b56ab1c933f1d555
SHA2562dc0e4558965382a24871ba75a6272c7080e338114382ef3c29f3447aa56ef77
SHA5121f8f8ad0af224a85b386ca42a8d569ca2a710459b2b1ff770e25f074cc9ad0015a38a18bddef5ab35ed6bc52f52a385bd27be6510b9b883cb25bdf910b9550cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f164383aefd5b7120f2327e1023b19e1
SHA1a9f225be98405fc8a2f6d89398e44a978ea110b7
SHA2569ada04463db5c5d457b727c8824f11ea6f3543c9db1c3058f04d499d50187d76
SHA512e67be0d3e5ec6a8f96aaa56bc390eb77504a6bb076c5841b5f10780bb57c10fadb33bd9722d7b2e1af09fe4505b8c556f63a782edbc135e72e51050842774cfe