Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
4df34b412f6be3f37319e15c7dcc91f8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4df34b412f6be3f37319e15c7dcc91f8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4df34b412f6be3f37319e15c7dcc91f8_JaffaCakes118.html
-
Size
41KB
-
MD5
4df34b412f6be3f37319e15c7dcc91f8
-
SHA1
974af91cb4e1fda67aab48aee7852761f82b7832
-
SHA256
596a648fcf3f7e5f23ae18499154fe64e1164f9970522bd5d6fb1ed6a5266b53
-
SHA512
4070cc43e4a91e58dc5f05858a9092f7524b977d5ba0c683ef6230fb7dacd20b1ba2e439657e08132bf9e492b767984208bae32dc98c53f8e976daf7030ce7ce
-
SSDEEP
192:uWLrXb5nhmnnQjxn5Q/ZnQieUNncnQOkEnt3DnQTbnxnQqXC9AJEoZQhNqoJyfWl:hQ/D6CQL4lg/m84qk60ViFC7az
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 4836 msedge.exe 4836 msedge.exe 2976 identity_helper.exe 2976 identity_helper.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4904 4836 msedge.exe 83 PID 4836 wrote to memory of 4904 4836 msedge.exe 83 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 3052 4836 msedge.exe 85 PID 4836 wrote to memory of 5056 4836 msedge.exe 86 PID 4836 wrote to memory of 5056 4836 msedge.exe 86 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87 PID 4836 wrote to memory of 2360 4836 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4df34b412f6be3f37319e15c7dcc91f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2bd446f8,0x7ffc2bd44708,0x7ffc2bd447182⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4165682237076880453,1554656849234628578,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD5cc39669d989e7b67f26e7ae9fbd0317e
SHA18c05ac9f37f55bf1b2ef4bd675c0944285fe6441
SHA256cbd8512d05b51d07f8d654e1bcf22d3601202e9eab0e0b0d6cb33e155ca892fa
SHA512da38ca7efe3bb8d27a37173946345c39e9d21c1eba1cd52e0504f0a2534aaa2d502b348cc6dd49c6200f2864f5a16511e6153a1c9a05a68494e487748cc91472
-
Filesize
6KB
MD5fffb0318564d04482bf5a9a4b307c427
SHA163122899de980df8171209eb460ca13da7d9e4d0
SHA2565a314b0b97dd085088d1571dbd577b2f172f00ffa702257341581ea3a84a3256
SHA512369f83140f4a8bc79302c6e4e63e5dc4976bd4559a61e55bbe145ce827fd3860e6b0b584ae2633cbfd3fb53a0869fd028a2e3d7051ab72cafb6f5c3ccc9e9836
-
Filesize
6KB
MD5fdd000409c13edd4489c7b3b234de2f9
SHA187de384b08174b5b556e013c5b74270057c8a866
SHA256cafd42adc2c92c820b94610e18603ecb08d91e01d9c35cb8f5b4c2c187100664
SHA512fd4c7093b5504118e13961e89c5afcf710340f2bf1f7f3296bf4cd62f5aa07291cc976dbc16c4182862abeeb099bc471b672f0ae638d7804610dd57f0e164d56
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5a7abcc4f28ec2ae5c697ba3e6f6e84f4
SHA18cf410290e14c48be9904b1755487b99eadf1b12
SHA2567b3f20e781e1830a49bb5508d01a20314b5510ff493d4b72fe8924802d0697bd
SHA512035bff016bfa09db189fb0ed6030d5ed766c0c8633cccc23363b71e2a15409771203192469b02316b17659daebbd7e957a039bf10215696b7efb2caa388308ef