Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
5b7aa6a6f98130d97686561cf5298ff6_JaffaCakes118.html
Resource
win7-20240215-en
General
-
Target
5b7aa6a6f98130d97686561cf5298ff6_JaffaCakes118.html
-
Size
32KB
-
MD5
5b7aa6a6f98130d97686561cf5298ff6
-
SHA1
49efcb8c46bc7afd0d33f0ca4e115aee467dbd4a
-
SHA256
74a90b706c2a8b07d05931d8107faf2381c8b789ed6d6b6d7acfcc30d394b8b8
-
SHA512
955d516d73e8332ead48e8c0d3883301647c9309b3a53c590457e07850aea97478469cd27f6a71b89ded101661a7a37ee20857519bd82dd3023d059556523480
-
SSDEEP
384:Qni0uYMMSwlKHSavoZ7eGp0lTF/+8jua7xiAWH6CKyCBOQJMW2WINIGqVj0:xd1Ha7N0lhn5Jqmj0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 1624 msedge.exe 1624 msedge.exe 4692 identity_helper.exe 4692 identity_helper.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 384 1624 msedge.exe 83 PID 1624 wrote to memory of 384 1624 msedge.exe 83 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 2028 1624 msedge.exe 84 PID 1624 wrote to memory of 4204 1624 msedge.exe 85 PID 1624 wrote to memory of 4204 1624 msedge.exe 85 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86 PID 1624 wrote to memory of 952 1624 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5b7aa6a6f98130d97686561cf5298ff6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa84ef46f8,0x7ffa84ef4708,0x7ffa84ef47182⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2496 /prefetch:82⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2288,5825221497365448420,14350022469955670601,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
767KB
MD5380183c95cf878803cba0768728ef33d
SHA16b6a9559c3e23e5b422670ae7f02254ca5fb0241
SHA2566aa38cb7b746121467d8273e88d74b68d974653c7a253be4a57fe95a6072a03c
SHA512eb52b62a473492f821d96ed29062592da88b7197fcbbcd34a583da933fd2f1dd9ff246ff0c6e98bac3d7e98c845a9a1d746201357292a280f0b02cac7afcd2e0
-
Filesize
189B
MD5efd079652ad21c50d69ad30ccf61a40d
SHA1000bc74057bb6ab42d2a160349e1597edb211bc2
SHA256045646bc1a87f1ce57c87ba8a6ed5332e36f71e667ac712be1df2fef80385f8f
SHA51235f643af8bb12bb445e3e6ce7577376dc69010ddf8d7e76752d703cb50f091bdeb9947b9718baa6e9e286d69df19a794522e446f29d58dc26dfea571045f51ab
-
Filesize
5KB
MD529d067c71e52a29633a3c1581bf6d290
SHA1dc5cd4ce74cf6f3efed0e239264f68fa86af2a47
SHA25605e38cc3e0d174974bf90aef8fa11d85b0d48976dfda7c80ca1e9695d0edae4e
SHA5128f55408c62096f8512aa29e2a5e39f83433ea3bfd0dbe19c2be4b47a03f40599a7c1a0c411d1dce46dee874d012036951e7509db1aba88f0f14b611fdf428556
-
Filesize
6KB
MD5d328839b448b094b8533e6c022c9ca52
SHA14515c1ca1bbd09619ad8dd08cf742c84db47c52f
SHA256e643e42fee332f1fafe96398997560f4e2440862bdd57badbb214b7d5c2e7e20
SHA51262870212ca6992a6073db5106b196caf8de292063c54aab3b40efb5309c4039267da05c55a5e036798750364a9019e2472814d25b1e655c0917e42936712cbcc
-
Filesize
6KB
MD5030b8af2d15f87b4fcaff4061d0cd666
SHA1ea600e261b6c7a38974036edeca8219467998331
SHA256d97a707b453023361d144c8ede7469efc66d60cf3e4a48f19a05b9421d9155b7
SHA512ef32dc11f5b079457b17e4c50b68a0a41e9fbc0963a6606cff0c5fc72056c0d15b823264a6a164b29b0fc9c43a5f89062bcadcf6ad3844461e17eb2b0b1bfa09
-
Filesize
203B
MD5c18d7d6d2876ca0fcb102704d4683676
SHA1f77ab6a93e794a152a0bf84dcf18b8710904b427
SHA25645797573f912396f811c5e575dff1572a70e58c57333e018e59113a11deb8c5b
SHA512292b9c31294983c5ebe66bbc27e1326881185823367826da194e8e2ce2192594f84ae3da4babd6d6a03e470196017f7acd9f5ed5e92dbe340b508b63ea4b9fda
-
Filesize
203B
MD522781126c2d359e03389b514bfad6aa7
SHA121c9e77eacd958856b06275125942a7e7512406c
SHA25619dd900c7c765d7136c335fe66618821087f56c41b108c72c376695992f0ac5f
SHA512337d37dbe606122645ff4cb719c1026ebebb7b057c5aebd6ef1c02dafafee83276c7abd7b735a089e30e83cf472e2a7c0115405817415f97f3dfa5aa8b0f45f1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5010b5f17c29a1f06a6a39e7ec320b3e0
SHA10a1c1139156f4a739e6048e02c3e6314c5d4fa30
SHA25654c641d3fbbc7ba22223741be91dbaf9228a12f5cdc235f5562e8acd53e8d860
SHA51203d6d653d7212d03548d677da4b820036cc5b14ca9d7e54230111b6911d1d7d2984aef4fff3e8fab8aff65eda36e6faa8cbd8cdd92433fb7244b4f13faa15ee8