Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
5c1aa550fe001af176a919123a244a76_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5c1aa550fe001af176a919123a244a76_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5c1aa550fe001af176a919123a244a76_JaffaCakes118.html
-
Size
102KB
-
MD5
5c1aa550fe001af176a919123a244a76
-
SHA1
b3fd4ef85ac9f3ae5ebd949945aafc3257bf63a4
-
SHA256
3a14fb7e3b96bdd5da3eaa6c45a39e8304182da55ea84599170ed3e623d32663
-
SHA512
628372fe80c67b51e64f4c1627a05cd03b6df1090dff5da19648f45830205cf450039c530cc192d014f5312fd3662e51552428842e8e3ae6d490c92acca6a684
-
SSDEEP
1536:/ggrqpp0jBVdUVVVVVVzzSSOOyyy66IIKKGG8B8BxxxxxxxGGddttGaa22hhjjZ+:/ggwpD6Vx9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 1504 msedge.exe 1504 msedge.exe 1028 identity_helper.exe 1028 identity_helper.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 232 1504 msedge.exe 83 PID 1504 wrote to memory of 232 1504 msedge.exe 83 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4792 1504 msedge.exe 84 PID 1504 wrote to memory of 4268 1504 msedge.exe 85 PID 1504 wrote to memory of 4268 1504 msedge.exe 85 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86 PID 1504 wrote to memory of 2520 1504 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5c1aa550fe001af176a919123a244a76_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed41746f8,0x7ffed4174708,0x7ffed41747182⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3372 /prefetch:82⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,11800360735000755467,4784481513078663435,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD54ef14f1866b0f96e422fcbcd6dbfe27b
SHA128238ea8d8a04937127e4d380833cc34a1af375a
SHA25648c911ab328ecb631a7ffe765f8b4ba119845aefa841c6cfccbf7c6cb08d774a
SHA5125f8f1229219549fa118c7a29c8b4b6bbbb69d11487d0986c0192b721b06994bcf17f6943dd40b18ec9ea260a5796b4ae6b2a926d0ee9b5a474f0dc2ca898a50a
-
Filesize
6KB
MD5278c620673597dee705a79414cf4969f
SHA1a760c17aefa8afd69c45b626bf0ab50e32a0b52e
SHA2563ebb765c768fb6b263e91d3dcd5db29be01c142ef4cf1c9792e24d8240a44805
SHA51225678b8c49976299262b460b0d60eacccda267d026ab8d71dd50ab67fa015771424ca15244ced763e402266566dc7ab906828dc7a9be34cc9b5d00e89471f5f0
-
Filesize
6KB
MD53a374fac13baa542ce3d8458237989a5
SHA1ff93b20386c5c15e606a1160b51f729a11f015ec
SHA256e26c55bd04150e16e4ad572f1d3105ddff2edb19fc658827416cc0f60792a9ae
SHA512d7b79d8be82ad18d0d2831a029cd64d5846c43d22ad720c480ef10d692bebcbff6219dbbf9d0856d677dffc82b9cd9c1b5439a1e845afc2928097349e7eed83e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53102b671c6366bf56394b8a2c3e1e143
SHA1ff096b994aa4f6f554d20facd8a945ae85a3b5e0
SHA2565390c90693567fa645c470d3f3b3616918c413b0e79bd21b20b7f9f4c1ee2f5a
SHA512af612f556a8d86ac24fb1c2c353a8b4dd2120cd017d93de049f3ed7b7e8c6603c1c4e1d0fcd6657a2f2de7741bc5d9f99e89265402835f7983f847743e75fb7d