Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
5ae9404f696ced3f9b5d32eaca11ac60_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5ae9404f696ced3f9b5d32eaca11ac60_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5ae9404f696ced3f9b5d32eaca11ac60_JaffaCakes118.html
-
Size
126KB
-
MD5
5ae9404f696ced3f9b5d32eaca11ac60
-
SHA1
b238e1edc7de29bf5eb060b913102a2df10f77fc
-
SHA256
bef65a2ee97cd615da8b5e23c248cd5b003e2585d6cc337ac241a24bdd5b0ce5
-
SHA512
e330a8d28d9083faf7e6a67b8564713b226f660b6ef06a83e2679997ab18de36d67d51337163bc105c47826d4a2c385ff6e468f6093f6ff91c38b8d83b29c764
-
SSDEEP
3072:vJW/eIsbscyRzLhxNlG2Tj7suCz7sdCEFH4tA/:vJW/eIsAcyRzLDKhE/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 2816 msedge.exe 2816 msedge.exe 5968 msedge.exe 5968 msedge.exe 5968 msedge.exe 5968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4092 2816 msedge.exe 85 PID 2816 wrote to memory of 4092 2816 msedge.exe 85 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1644 2816 msedge.exe 86 PID 2816 wrote to memory of 1632 2816 msedge.exe 87 PID 2816 wrote to memory of 1632 2816 msedge.exe 87 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88 PID 2816 wrote to memory of 4460 2816 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ae9404f696ced3f9b5d32eaca11ac60_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e346f8,0x7fff76e34708,0x7fff76e347182⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13464510323626493261,3385355928363035299,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5c04547754c5f2c33778c5de1eeaae0ad
SHA169fdcfdf37015ca10c9414454d87dc478a60da0f
SHA256494441ac8241b6e409ed3bc44f632de9c5561c20ae2fe682aba91a79bdc33783
SHA512ee36c9e17af3ac6587d35f7b16cdb6ae15cd56368fb669d9f425e32ab0d0b7496b649f1593c271576470a3dbff4375e1db7feba18517f4c762a9cf7ca7643f87
-
Filesize
1KB
MD541cf7a419b6373afbea2741065ea7339
SHA1519ca9ab335d4a06239b07a80df5203bf76ebb2f
SHA2567c63ab4177fe87565275f3cfb02e9b0e1c3613bf40756aeb6e4455a30cb6cc39
SHA5121cff9270fffe1f067f2fd0901c238753d1f689d80ca992370b2da8e13cf19191d2d72049202c139c6618d54f09c68a77caca68b4ef010bafcb604f6f39800b71
-
Filesize
5KB
MD59926a584303daacd73f48ca81605d3c7
SHA1a691bf69154803fb5731aff10843370a263890e4
SHA2567dba984f470ffe1ec1dcd3c3111d6eafca21d08d41a58a4112686ad4c25957c6
SHA512aff28b856ea51ddd1e61887f3fce4c6dd307d69a72c15eb308f48ac651ff57732e1c32814373bdf99478dc2fdcc1c77077b81630cece55401cb986193c50adc4
-
Filesize
7KB
MD5fc96b1b9780827cac3169b09aa271496
SHA1b974bb92fce3641728689b5d7945420a48380174
SHA256bf44df2a11c679df3ec8a35ef1fab34d6ab2e0e6efe903ad5eda00900f3894a3
SHA512476c1ab3c0830d10a6811db6faffeabc7d4e6b7ee4359b27f92e133ba1945d9616a86d36cfab477647e2977b935b22ab480d99e0a9d247f65cf94671fdf1d0dd
-
Filesize
11KB
MD5732cb29a430f1a93b0d10b34b118b2b2
SHA1b06c389c79e6595aeec81ecc723be0b03c805d07
SHA256cc46598cfb253b2f1753dbe1c58f69c101aad476e2eef4699fdc3ca04643dfb7
SHA51243be4dec37baf6e0fa1d518cc3112d653b003d69975756a108b668a8e15af4246aedda271158ac5ee54ceda899849fe7e85d39b9eb44fe295ab349a49a0f00d4