Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 07:45
Static task
static1
Behavioral task
behavioral1
Sample
4d639977f22717e1bcc5aa599b550df5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d639977f22717e1bcc5aa599b550df5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4d639977f22717e1bcc5aa599b550df5_JaffaCakes118.html
-
Size
37KB
-
MD5
4d639977f22717e1bcc5aa599b550df5
-
SHA1
23d55351c29d40f56764fc7627dffc674654514c
-
SHA256
a741203d7ee72d79b2837289368340d7af59296e2473073bc64e01eeea821ee2
-
SHA512
b7282dae4d98b8c68e580919abcfd892f8c96ea0490cd525703d4b12f179e821f0aa0d2e8a5343c622e100baef27f7bc63966226ec57cfed4921bfa511fdfa9b
-
SSDEEP
768:zYfiMp2pXKWzCFSwVxlcPKOqNrXmj2dGoB:zYfapXBCFSwVx+KOqNrXx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4112 msedge.exe 4112 msedge.exe 3012 identity_helper.exe 3012 identity_helper.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4892 4112 msedge.exe 83 PID 4112 wrote to memory of 4892 4112 msedge.exe 83 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4144 4112 msedge.exe 84 PID 4112 wrote to memory of 4924 4112 msedge.exe 85 PID 4112 wrote to memory of 4924 4112 msedge.exe 85 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86 PID 4112 wrote to memory of 3280 4112 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4d639977f22717e1bcc5aa599b550df5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff562346f8,0x7fff56234708,0x7fff562347182⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18416860421728268694,13828888699187452622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
734B
MD530a913d2c80d914b52aa99f0dac6e011
SHA1f7ca031f2150ca70f09726e86e9a470fd4695c8b
SHA256ad1fb8a96ba181d1305e8013794d92fee671e57ce4257d62a6914b67d88f23b0
SHA5127b181f780d0eb536699fdf1e05b60032d3c6b1098f6e3ac78b7c148a8a98174b97fe91e42e9b1c866e73f74230d2e74eec26ebeea746e9612972e38a655a02e8
-
Filesize
6KB
MD5355961eed5fa0492b8291abb7ca07381
SHA1abcfcf5f77961136026d462151f25baf8999943b
SHA256b900109a1f849851aef4132c4b945c2eba28d68cda33cefba4725145ece0aacb
SHA5121a8a154f5d2b32b6585a0215417b9355b92b57f82287ce43724f78558bb3e099199acb7d102df13b17b123ada1d5a3f9e313ecda1ed90e334f68fbbcab4a18c4
-
Filesize
6KB
MD548abb57d35921cc1d3220fa4ed0ea5f1
SHA1f2d705e0c0022b1dad340146385ac42c4b245f4e
SHA25602386672964217ceeeca3ec484fa2fe4a775d6eb2cfd85e727ac74243a611989
SHA5123fe44c0b3cb895c1b27b4df9c53377d9e455c1b667232de864e93b86ec678b84b1c05adefe3e5189ae9fa6dffffe64c53997e84261e1a2d07f3d27d1f027ad5b
-
Filesize
6KB
MD5241e0ab6500fb6e17eb5cddc6bd8927b
SHA131b857fc2a95ede4244a06c175bab4c98d590d35
SHA2565a6e8df7755fd557bf8901b3742cfc196805936c0496edd7d3e9f6350bda6483
SHA5121bf2e67cd1877bbe135dedda1fad273c2d43a7756455f99c4e19dc4681290aaa6d3f44a21b2904d7b9d7e0ccb2120e9b205e33606acdf087fd9d1d7e90d44aa5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a36392989043245172f8da9109d0e23f
SHA10e56da9fda8b364ec740ef1a089060124c2bdccf
SHA2568924ea27fe4fc483b9525c896079193d8dc3ad8e2aa4e7ec14b6efe0011b6835
SHA512599ab83169ffe7cdcfbbacf3b95347e0a928cff072daa34cfd1a0b8ed6171b4a93e98b28363e0f04bec5a8f1081150f072e915dac003b3fe7d8d17589b65a965