Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
5ba8b98624b83a8eb25afb1c3ec96930_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5ba8b98624b83a8eb25afb1c3ec96930_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5ba8b98624b83a8eb25afb1c3ec96930_JaffaCakes118.html
-
Size
182KB
-
MD5
5ba8b98624b83a8eb25afb1c3ec96930
-
SHA1
1154d16d06bc1d6d3a2455a1791986e7ca6db6c3
-
SHA256
07fbd47946811cb547e06ba797e4e20cc5e5a952c8c245a1bfd29db8eecb9c17
-
SHA512
1a7e4adfde016ec99b7d8bb796e7e3cc49b02ba8c4ff05515c19ce4c21c0e5676f7c463195a4b601c3dc935bfea09537ed7f034fbc133614f0bfe0cfb499ff3b
-
SSDEEP
3072:SAgQmyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SAgQjsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 452 msedge.exe 452 msedge.exe 1448 msedge.exe 1448 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1216 1448 msedge.exe 83 PID 1448 wrote to memory of 1216 1448 msedge.exe 83 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 1584 1448 msedge.exe 84 PID 1448 wrote to memory of 452 1448 msedge.exe 85 PID 1448 wrote to memory of 452 1448 msedge.exe 85 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86 PID 1448 wrote to memory of 4324 1448 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ba8b98624b83a8eb25afb1c3ec96930_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14449245399841079967,10933628885934634082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,14449245399841079967,10933628885934634082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,14449245399841079967,10933628885934634082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14449245399841079967,10933628885934634082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14449245399841079967,10933628885934634082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14449245399841079967,10933628885934634082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD509d0826bde920f2a7b05e5e5e320eb01
SHA1881a9120cce1f35eb5de8ff15898ac46b42ef9a5
SHA2566c3445a5d61784457381b90025e0162303591c93ed89da1b31962954acef1c43
SHA5127f377960baf762dab16a7afbe277ee4a7955367d49eb444e885ca70b09667c94a7de29d49bd0274defcfb0930ffb5fd17284242ef62c659edefa8bebec71d035
-
Filesize
6KB
MD5ed78f7bb567b67932e6d325f6555e318
SHA14040d5c830472fb3d83fc07b31f3056fa9768da5
SHA256ad93e8f546f7e26a26b7eb342ed5e6c45173a26792e493a49cc62e339e391640
SHA512340edb3148e04b159779488428061a4e1fae1abe3145504d17cef12eea7ea46240474e093b6c0d354fd79d640bea232c5c660976ecf66ea59b3926dcffbe5eee
-
Filesize
11KB
MD5b7b821205e31799d37248c6c85ee5929
SHA1a858de79819daa9642ab6d9fd576c428a97af758
SHA2568c94a0d9ccc75c6a277dd40e427bc84339f57593af55a06506ae647b011b335a
SHA5120345ae6274d2abe2f2ef957347fa4d5d49d2ac12f60fd84140608d46cd9b1fba74d4613aa610a42978b4f3b9d8d28d0258121d8451010fe5acf3e59f3ea02b36