Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
4d99d4d9924516a9fba1c7a08583e56f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4d99d4d9924516a9fba1c7a08583e56f_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
4d99d4d9924516a9fba1c7a08583e56f_JaffaCakes118.html
-
Size
7KB
-
MD5
4d99d4d9924516a9fba1c7a08583e56f
-
SHA1
86e63aed96b1025d9077dc7bb9ced1de46deadc2
-
SHA256
ccfe1274e90ad4400648ab7fa7cf53189b6b940eb360bfc074d70596acfe90c9
-
SHA512
db245c17ae215691d5f22552b4344c0db5e30c5c339e1a4f08d0fa3a6c31726c03ee08ba3f02e7388a30c7d3e6e7891de3728fc94b3c154a8a4d033d7dab59a2
-
SSDEEP
192:m+fZ96bewld3qgnmlV1ZbHlkiQmc/UrbPMfUP:m+XKewld3qgnE1ZbHlkQc/mMM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3092 msedge.exe 3092 msedge.exe 5080 identity_helper.exe 5080 identity_helper.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 2400 3092 msedge.exe 83 PID 3092 wrote to memory of 2400 3092 msedge.exe 83 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 1452 3092 msedge.exe 84 PID 3092 wrote to memory of 3172 3092 msedge.exe 85 PID 3092 wrote to memory of 3172 3092 msedge.exe 85 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86 PID 3092 wrote to memory of 4216 3092 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4d99d4d9924516a9fba1c7a08583e56f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4d6546f8,0x7ffd4d654708,0x7ffd4d6547182⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,6908778515085426131,4821040814376070432,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD518fceb24adc103177d70fb5f42a53ebc
SHA1715757a30e169f33e1df51b01b31da002cacf4c4
SHA256964316ee529a193638290c744e4a771c2789c2cc7741f7cd9a8ca3538125e41f
SHA51262f4d42d257209b2e8e5a2ca1cb7679f91d76ce0325e7832f0d446c68a0ecbd6cdaf6bfccb3da1b2740209b970f5ae10cce9ead82bcd47eb4dc6e1c7a5163fb2
-
Filesize
152B
MD51773fe4957a1e9c2f453d49f87f5492f
SHA12a7a5da6049d116a517f8c6d69cb8ac9850474b8
SHA256e0e0ce9851eb8dd04ec3ff654376beed233af832fe519e91fc205e5048bb05df
SHA5125228af30ed154c1a084ab58e4f08a419b836d76c918008bc1f07d58e31cd59a6bbc9818451a943396ff0f6246b3a81656c40e04102477e86b3067365aee463a7
-
Filesize
5KB
MD5e6d3681123d63a502a92a09fc2fd2b96
SHA14b4978d8b31c9cbee3c334871b651cdece6ffd4c
SHA25664e71c110187b2e8c12958a6398956c200dfbb1d6253cb151bef61e6936cc47c
SHA512155000f9ef081f2b8148143c457cd62b38413437ac3a10d42cdde0f3a050d0d4a70e54f1723d425a6cec42f08a70bf6d845b3f36376a6777c333f71145e1eea9
-
Filesize
5KB
MD5e5f5e3cf14a2f50f1d795c7ff3a2074c
SHA165dbadb58295f4083e25e8161ad6a73f2c9bcc0a
SHA256ab91aa0843ccf90e7718c882a1336e9366aa55dbc99340ad39c8c8301fb8b108
SHA5126b911916652b29db37c5b5a6b79a97d60b8aecac0784b505c8445e33e5525c773ccb352ea8287a1cc4772ccb48e36c74160e2ff5f56597dfbd5b11da6b0736ab
-
Filesize
24KB
MD575cf1868de866d4f4b19b02d22178e5b
SHA106eb2d6682078869f44c026a470bd7fd951500c3
SHA2569c57764d45b2d191f6a73cb819ab5bb996c55d3f9a84ae5a63f9f58de66e1a0a
SHA512450ed1d7012c87ed8ee06c317f35c823f6872e0af1cef238763384259d64f30d8ad532ca70394707678b1f5f5eabff0b5b1a9511e79c54d7ee9450d61e936305
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58f4ea117952d9e7d321cad167b4b710d
SHA12195f31d352f61157abc873ec174bb20fee8e69d
SHA256df275a68e751751b1f24ab528843d51f4eae2c6d5ae105e6d1ce6375f2f74954
SHA5124eadf17b0d4b31c32fe257ccc9665fd132dc4c3dfd6b7020826828706db9adc91bf03246273524b0798a5c551fc0b8178eaeb7fe3bbeda9353ac85b642f8c5db