Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
b4537eef9d107313650dc5d9ca4eb507_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4537eef9d107313650dc5d9ca4eb507_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b4537eef9d107313650dc5d9ca4eb507_JaffaCakes118.html
-
Size
8KB
-
MD5
b4537eef9d107313650dc5d9ca4eb507
-
SHA1
1a2ad5ae0b04420574cc23391e67442ed6ef23e9
-
SHA256
44d5a6474b6eaef42048d9f439c51a466d16e6aae983d08e30fb1701e9c3860e
-
SHA512
2e3fd3fad8a56e803842eb62ddbbf6ce8a236b4aa237962066558d23120caf39c1aa82005230d961f240bf46f4ee763fb786eab9de28659314ccb3d546210d59
-
SSDEEP
96:uzVs+ux7x4LLY1k9o84d12ef7CSTUazfcsvtF7R569Ehy2Uk0GnUclhADcEZ7rur:csz7x4AYS/g9Qcb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 1416 msedge.exe 1416 msedge.exe 772 identity_helper.exe 772 identity_helper.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2116 1416 msedge.exe 86 PID 1416 wrote to memory of 2116 1416 msedge.exe 86 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 1008 1416 msedge.exe 87 PID 1416 wrote to memory of 4872 1416 msedge.exe 88 PID 1416 wrote to memory of 4872 1416 msedge.exe 88 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89 PID 1416 wrote to memory of 1140 1416 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4537eef9d107313650dc5d9ca4eb507_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff227e46f8,0x7fff227e4708,0x7fff227e47182⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2148 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,13647777868969229809,1950361573403388729,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5d4088252c07a046b938da9aad74c3184
SHA1cb55a8dadb1b89ef0f66aa21c9a168b3388ccbd7
SHA256c5d590eac95b6bb604b627c5750dbea230765897f43720a718f63b6ec63a3426
SHA512c9d367b4102715029b392f71fdde6c92953cf73e9294a3a423ee3a9093490aad2555361328f96ed94c007d8572f09d87e1841c9c13d8d5e6302828834adf0e46
-
Filesize
6KB
MD56f6d09826fa747e16a97336f067837eb
SHA19c3b8814f89a1c654e7e9099ac3cc73c0d1b5145
SHA2566307190d8a7224991fcfe58798e1e7c966fbca62d202704a17f73188791bce30
SHA512dabe4e9baa7ea1f6aed34c1b74a7b9ab2001721c9f243d2d3c1f840e32bef3e528c860b5b7c696c7da0e6b6de3d5fc9508c830a7e46e3b55e7384ad3697f6aec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54cccd226ee96eb68a38810d572614ea7
SHA1ab6c44542dd78685d8f1f741d66616c5f4b6191e
SHA25697454879a043970b99bf213ed2b4198c887d870197aac4ef864735655365f3b1
SHA512c5f380ed5bc9b53107d335ab477c9dc628dfed6e9297efacf933cf3f06c38de3a143e2957aa08841233c4c202883b84f2dcf56bd8eaff0964af48831f6e78f4a