Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
5bf60131f2d624084554b77cee35785f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5bf60131f2d624084554b77cee35785f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5bf60131f2d624084554b77cee35785f_JaffaCakes118.html
-
Size
22KB
-
MD5
5bf60131f2d624084554b77cee35785f
-
SHA1
96b8abd489af24e0920ad4fa71092a5c577cd6c8
-
SHA256
2680921a57f31a5c523cb2f4b48427b297751f633b0c348eea104712446c6afe
-
SHA512
32822aecccb07f2c34710641023470422193525e4ad4983eb716e2b82bfd2dec6ec78b47d7e9123e55013a5cabbac429dba9cdc3090eacb724ea6555a79c89e4
-
SSDEEP
384:2uwmOzJhEpEHPxqsb5tG4xz+8sG8QAyNIT9TsQXxGowmcHl0xI1TpV1PoeMl2bBZ:Zw/zpGd8sGSy69Tuzl0xIV+EyDsom
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 1168 msedge.exe 1168 msedge.exe 3868 identity_helper.exe 3868 identity_helper.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 528 1168 msedge.exe 83 PID 1168 wrote to memory of 528 1168 msedge.exe 83 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 1116 1168 msedge.exe 84 PID 1168 wrote to memory of 4980 1168 msedge.exe 85 PID 1168 wrote to memory of 4980 1168 msedge.exe 85 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86 PID 1168 wrote to memory of 2340 1168 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5bf60131f2d624084554b77cee35785f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce95446f8,0x7ffce9544708,0x7ffce95447182⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1500,2661299596680742014,573070435826778737,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
5KB
MD591612d95ae554ca3bd047c1e6aced7fd
SHA1c61fda530ef915e406293e55aa3c487927a7ac84
SHA256a34a17d0ea5bca963a19ff1e95551441cc17a1a9213d1759cf6b2649e9ed85f2
SHA512becf1faf8a7f5a04e675869d5df263b1a7b7313bc56577525f458e7db0512e6d38dad1cd5a3c01ba0e3c83d45586c1a637e162e8b8efc82e95bfdac6a5bb9bd6
-
Filesize
6KB
MD5b699ca8e0b4d33f7525b11558c3950b3
SHA14bcf48b0f5dec04f11f815b88e6afe3c0275313a
SHA256eef1a9ef665e153a1c7144e82d9068bc768692e9a6afe0c611ee7753db35d23e
SHA512666397c30c2f50efe1a8606eb8355b3557a5ba4f9dbc8a0987ca298ad7651c7bab31bc2d19c9fbc70784fe886bdbbfbcedc83ed7232ee741a575bb077655443c
-
Filesize
6KB
MD57e684bffccef85a5b77fb7ef4f8b28a4
SHA1aee37d54d963346e07c0e0b2026abba3948dfc1f
SHA256e93f297cfcd3243983b391216790e052231ea8576ed68b1538250bbcd8786779
SHA512c1a188279946c16e975b3a7cbb98f43a27ce1c13bbeec28e05af203da1411896f038fe843fb10c3dcbb053c42265ef638eba67a8734b4a723d3c98d12800ff78
-
Filesize
372B
MD5877a2d5802ef9f1a16783533d3e76f77
SHA1edceb4ebce44b99da6aab26e857128fa271e8305
SHA25646c05f9f9d1257890f54650d2fc9439c38ee640b1f81e88651965e6deabf067d
SHA512be26577717aa4a55fb53e1a27391d1678d74f376b986c03d06e41567c235d63e8abe6fadda51d057f40845928d26c8c622a18716613b688fb7ff7d04f9cc397e
-
Filesize
372B
MD5ec6c514dcfc91165c9396b82206c77d1
SHA1ecfb6338923b4db651586b87741bef49990eb5c3
SHA2565282ef81ef9db332e279d7b0c6fda1eaa0d390956783e65a1502da143a61d580
SHA5125ee5dfad30b19768cde7c6d947f053d9e549968c3647d6152a7fc415874dd3c59d79ab57beebddc734df7b03e61bc15f65e4a0373eb3e75ce2801d0b60920e8c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52d5bb5213ca9e24838d42a8b7f262e87
SHA186375ec8b063533c683af77bc45813bd3b317592
SHA256676d9c11c68ba4d759b51a985d84146ac5a5df1085a00fddafd80f8e59b4ab3a
SHA51208e196dc5ab7f939e16876120eb3f2a6ef9254af9426d7a45681c11385900c437bd3d60563e2dc5bc23ef93e765cd7aaa64d28996412588fad93358731335509