Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
5bf72d38b35cbc0bfd4c0afdfa465731_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5bf72d38b35cbc0bfd4c0afdfa465731_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5bf72d38b35cbc0bfd4c0afdfa465731_JaffaCakes118.html
-
Size
33KB
-
MD5
5bf72d38b35cbc0bfd4c0afdfa465731
-
SHA1
45c13e387ff3e5e00c1b6f658352a861b7b13d0e
-
SHA256
4a4c61d83e2b8c8648b47090515536a77526d5b595cd40a1f58f64f79ae9c6ee
-
SHA512
f799754ca6cf211ea93d0004eeb440425e37bc841e40a0cb229fe14d799615b1e033f3dfb4141183c26ec71c97951a77f72eeedd44b17d85ebce4ce15d838571
-
SSDEEP
768:3aWHkdz89o1GGMHQ3FHcSpHC1yHY0XBDezszLFW/p:3aWHkdz89o1GGMHQ3F8SpHC1yHY0XBD4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 544 msedge.exe 544 msedge.exe 4336 identity_helper.exe 4336 identity_helper.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 544 wrote to memory of 3888 544 msedge.exe 83 PID 544 wrote to memory of 3888 544 msedge.exe 83 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4608 544 msedge.exe 84 PID 544 wrote to memory of 4540 544 msedge.exe 85 PID 544 wrote to memory of 4540 544 msedge.exe 85 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86 PID 544 wrote to memory of 2028 544 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5bf72d38b35cbc0bfd4c0afdfa465731_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0xdc,0x7fff467446f8,0x7fff46744708,0x7fff467447182⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2896 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12739969186529910557,4631033288275731872,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5ca43f308eaa97e92f77939753a3dbaa2
SHA1ceda587e3d5b41d5bb50add00d6b9adcf4f81651
SHA2568507617cbcf4b3c1ec01f517c7fa89e60c178f611a2dd20dab0557bb8ba545f4
SHA512eaf674684d6d2467f2d655d95e792cce0799b216812e1635ddb68344c9c1e36117011a765a529e2676d80cc00a8c618352f757a7134155e30680c1cb55034874
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
337B
MD5e968a2e4d2c9354c5db9d9e846eb75d7
SHA13a4bf3010e95e23a8bf1bc71755f2903285b191f
SHA25695488503c0546c111b0eaae408edf08ee861711211170c679ab9e75c6492767e
SHA512078d8b0784a19dd62353e0cc1e553216aa7e2c63e957aecacde838e28b4d3ec61ea03c65c2223b6b6f0c595eb22b984e2d2ffad2b3be6f260114569c9b1cbffe
-
Filesize
5KB
MD5227e17a3d0b6241f89785393cd29cb37
SHA11337e22947bff7591edd4a8490b4f85fa9146d13
SHA2562d353245620508665669c6da21b7ba49d1ded984368939de876e851ae3c03fbf
SHA512d56f6c432f4f3c9bbe56831024d6366cc665dd5f8b0d1f1fa7e7fd2c203cabbff5634513d022ed641cc417501a1fdd3186aa71a367bf49ebad768f0656660dd7
-
Filesize
6KB
MD5628efe8142ea7e1000d7dc9cb2c0393a
SHA19ba9a9077021cfd10956767905f17a91cc2ca73a
SHA2561624a298a4c1f14f9ab4e5824632968ee6107a81f42cd316a0da8564b037de73
SHA5125ab238b43499837004d69542d301b401723b517d2ca1ef66f2a928c56d3151a87fc88aba5bac73aec52c59dff860107716d4457dc119e03a6ce7335b89513921
-
Filesize
6KB
MD5142e17975a0eadf84147a42d3ac166f0
SHA11e25df4cf1ea93d2df05ee268a8ace488822551e
SHA256f0762b8206aa93b8f20638fae7f2f675b92d3de31d910683f83f9f17045effb6
SHA512cead66e25ec6a7d4ccc33b535f9eb4d09119b1ce8db04ba3b00fd80986799fe372138721e411f2c4c4d5485c0f24230ba457392f1f2a7f4c747bfc66081a185f
-
Filesize
6KB
MD51e4340a772ef5a69f09a5888dc4ad29c
SHA1e1e2093bc00c88babd7bc172727ca5dbf77c10d4
SHA2565727394a67446728a10fd7ff2176fd54ff228f0b4e1cf2468c1f065ae20e18ef
SHA512f46d6c96a26ee3d7ff3f3d6f7e0c374e4482314f0766ac80a2e77ac9c25b9076911614ba5799f8b87e4677589dbf0c6135d0f1632c1f7151cc4cdc9552974324
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56f56dd7427f6a47ae73aaf77bede5c79
SHA1e7e282124ff094092a6f002033ff4ea7ea4a0083
SHA2565cd4f3f8a1c2f5318582ae57957f647ace6781b4aa6ba87066025b5add9da241
SHA5121e95249b4af2227176a05b909c6edb63c66d05730c0c9d9f977c92c85082a6631e2abb40f360f3723dccdbd455ec0e6ad03331d5f9db1ecdbbf6cbd8be9c58cf