Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
5bd8452be94819f6bbbcfa5d9b03e1ef_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5bd8452be94819f6bbbcfa5d9b03e1ef_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5bd8452be94819f6bbbcfa5d9b03e1ef_JaffaCakes118.html
-
Size
36KB
-
MD5
5bd8452be94819f6bbbcfa5d9b03e1ef
-
SHA1
671803e0ba8cf187cd11a7e10426aa06e315ac8a
-
SHA256
6b82ffae09eca0b337ef6f9e6e8dc82ec3a399121fca93a816c90e0181445368
-
SHA512
2c362e28926a7c32946440528cea03797b4ae1116f32aaad685d009ded52ea973d9eaaee0761df7c5c2a7e8d20463a97f7a5b39b5b590c84d693feec937486f3
-
SSDEEP
192:uWreFb5naVkpnQjxn5Q/QnQieDNnHnQOkEntkenQTbnRnQwXCwAuskY3xP9YIDqS:nQ/+B2r7CzRtiDqI0Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 4528 msedge.exe 4528 msedge.exe 4300 identity_helper.exe 4300 identity_helper.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4528 wrote to memory of 388 4528 msedge.exe 83 PID 4528 wrote to memory of 388 4528 msedge.exe 83 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 3700 4528 msedge.exe 84 PID 4528 wrote to memory of 2308 4528 msedge.exe 85 PID 4528 wrote to memory of 2308 4528 msedge.exe 85 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86 PID 4528 wrote to memory of 2904 4528 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5bd8452be94819f6bbbcfa5d9b03e1ef_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc65f46f8,0x7ffdc65f4708,0x7ffdc65f47182⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1508,9889841009361066949,13847170165027162948,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD58300df9669c96b68983da07fa3b2e4aa
SHA13ba9c4d45c8b40cd2441c0d448c7dc3945ae86ea
SHA256d7276f341aef6886df8a763aa28ca5575d094a97a6ffbecc7149db03addcda93
SHA512dd27d1232eac0399154e71e3954aae6cae33a3ade7613837d0014e034da871cfd37bb2dd6c2096f2dbcbd04e755ceb64c0cb4c1a484b3db43f309885f8b86d67
-
Filesize
6KB
MD54f10ee0c19213e11279cdc456b9aa62f
SHA116327ba0054a330487689afc70243fa372127f0b
SHA25663029aabb9f5f224b47c0bb95d1e9ddb1bd4e40eea921814bade06c7be5b88c6
SHA512d194ea9f30e6993624ff21a1777647c7bd32dddb6658a42b5bad511b11aa6075ef56b0842dc0d60e681c01d5dd2b46f779e73e709ac4de687f22d6e2097bc81c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD55d804a3037210b70f87469ade2c44dc8
SHA139ace8156f96c445118f4908896ab2eff48ca872
SHA2565c89a2e3119aa35e1adcdf02d4fc701464ce953d4d3b15dfe9b8d61e07ebd165
SHA512adeab599e5e673df9a54747edd8771ba405521f288ef57021dce57728d94d93d2dd95fc7042a2f56c90281588742e2e0d6eaebf5389e0112b6dde7f785349fd5