Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
5bb3ee3ef92dac774dadfa6e1518920e_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5bb3ee3ef92dac774dadfa6e1518920e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5bb3ee3ef92dac774dadfa6e1518920e_JaffaCakes118.html
-
Size
460KB
-
MD5
5bb3ee3ef92dac774dadfa6e1518920e
-
SHA1
d96b28652ad57c954a00b9088e73a604416203e1
-
SHA256
85e5e767800aaf7ba9a1056b1e2ae69fb3e2814a9f58ca21dc1f6d1286df9bce
-
SHA512
5299b06852937b8ae9af776794cef68940b37bd91345397642e672e888c45729226a8741e28997bee6c0bb82553d794bb0d46e3e5c678dc8a336dfbcb07e157f
-
SSDEEP
6144:S0sMYod+X3oI+YFsMYod+X3oI+YjsMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3/5d+X3N5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 1648 msedge.exe 1648 msedge.exe 4328 identity_helper.exe 4328 identity_helper.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1648 wrote to memory of 4772 1648 msedge.exe 82 PID 1648 wrote to memory of 4772 1648 msedge.exe 82 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 2016 1648 msedge.exe 83 PID 1648 wrote to memory of 4908 1648 msedge.exe 84 PID 1648 wrote to memory of 4908 1648 msedge.exe 84 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85 PID 1648 wrote to memory of 3348 1648 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5bb3ee3ef92dac774dadfa6e1518920e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7e2546f8,0x7ffd7e254708,0x7ffd7e2547182⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1166974975425357375,10390239440275660619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
6KB
MD59bd54aead42b202861b2d90b9e495a78
SHA12ac3ce59c705df875048a510d8899bf93131b381
SHA256a99e2d9bd401c66487572824c272099f1324cf52a8460814508dcfd2da7d142e
SHA512906057f849d53f2c9f3be1dae859d1032c18e6b94022e4ffcf1897aa4903b06ddc54a37f281cc9009fdc9e3a1ce4f69abf285ad36ee199ca468c66cba38345bb
-
Filesize
5KB
MD59f8596332fba2d6a0388e060f87a7632
SHA1422bd5396677f6b912f159d4194dcb5ef529bd68
SHA256bf46890a5af61b1fd613f38e5b1553a5ca3260373307cfac18bd70d10c7eedd9
SHA51286b78ccc06be71c4d7a1ed7c832c70da5fa713bf13f656f98bd495552ede019cbcb719de1027fb40b22bd22974485511e871968a253c3bec3d013c34016a14cf
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5c75d6220f6f146bcfd7339dd0ecfd267
SHA1d9cde54cf9117a088ec1cd0ac076a86b2e4dd2bf
SHA256011799ee6f470124d79444756a40ee236958c4ed6b85b2da2f96399f8dd25770
SHA5124872605438fb1ae8988e7d6e8559e04e15e05d0bb96e9e4be79ce6f048034d24bab6daddfe0d1aaca310492efb0e8e7405b83d53e624f60d9435c6293d1deef6