Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
4d80e67fde3cfd238b9956b682b7e80f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4d80e67fde3cfd238b9956b682b7e80f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4d80e67fde3cfd238b9956b682b7e80f_JaffaCakes118.html
-
Size
6KB
-
MD5
4d80e67fde3cfd238b9956b682b7e80f
-
SHA1
fe346a4262a4ee5899e4325abbb79ddbbbc595e9
-
SHA256
d079a163e6cf15a3fe6b3e7233d6e231bc1516434e313360c31ce31584401617
-
SHA512
f92065939e5e99d79b4963da84c948f2fca77894978f764777b1490b122ed7df1665b2b735a22132a3aab38e9d6d9329f74986aa3751fceaad55aec9350c1e0a
-
SSDEEP
96:uzVs+ux7pedLLY1k9o84d12ef7CSTUjccEZ7ru7f:csz7pedAYS/Bb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4392 msedge.exe 4392 msedge.exe 4776 identity_helper.exe 4776 identity_helper.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 800 4392 msedge.exe 83 PID 4392 wrote to memory of 800 4392 msedge.exe 83 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4752 4392 msedge.exe 84 PID 4392 wrote to memory of 4648 4392 msedge.exe 85 PID 4392 wrote to memory of 4648 4392 msedge.exe 85 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86 PID 4392 wrote to memory of 3272 4392 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4d80e67fde3cfd238b9956b682b7e80f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8ddb46f8,0x7ffa8ddb4708,0x7ffa8ddb47182⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8343587979315997812,730385035903068930,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
6KB
MD52a219703a488c322a36df120138431c4
SHA11a9060ebfceab0b1f5d1df00b50f976946fb850c
SHA2560d328a14bdadcddc36fcc8f25c8fabc7bd672e0f0900a45539af8fcc49b5fe9a
SHA512377973563a3b729eff5d1f078ec924aa59f5c3e0566e57458c277766599236c7f8b646a582051ce0b37881b83f4f5f8b454225fe4771916a2c7f8a7920a2fe51
-
Filesize
6KB
MD5b33040c7aa3e89a0ce5c077d63c842d6
SHA1f05457be8b66fc5e1a9c9c56c545c0f5955059da
SHA25607866703451268e68adfbe2203f2caeaf84afe0d1f354164d9893d83612421bd
SHA5125e2e4e1b0ea35bc3eeca607290cc5c1105ef21f8eb3109a47749ec6c16a65297a0e31a286bd393a619c3ad547fbc7a5f4560de742af4f01c71ce5b7144472bdf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD526a49af087212d00be19e4658f6e6d75
SHA1a191f08e79395b04f1ae764ad2f9c029e06ff04d
SHA2569ece8e176e6fc6b86af36e8522df54187df681dcdb3edd2ecd7024c5cfba8211
SHA512ee6a35df9f209714cab00116c2b49f6c63e534bc023230b373a59e6125d52bde3d50e03170a3ec91ee1b3d6ded824d9f26d9077498afb039514eb5e5117d4df4