Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
5c8c1ef0bbfb8717226944b671e2820d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5c8c1ef0bbfb8717226944b671e2820d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5c8c1ef0bbfb8717226944b671e2820d_JaffaCakes118.html
-
Size
87KB
-
MD5
5c8c1ef0bbfb8717226944b671e2820d
-
SHA1
5137f7b5290e2984cd91d630dd9b8b60e6f9bf27
-
SHA256
26f1804e9b9bef12150ef7881e43a3395ca9d860ad80ec8e7132665cef4a6679
-
SHA512
af3d3ea231126e4bd894fbfc78e4a658f9ba1b29a54cf958db85bdec2dd058164cbff699aa49355f3bc09bf84c71b0325ad311a8e538ca64ef7454cda4baa714
-
SSDEEP
1536:yvGIJV6gtrEMaOS2w2o79dCauKThjWzhmrArmMLf7WCYOLM2rqzf5+lwyb+3vXTI:IV6gtr1aOSeauuhjWdmrOmMLf7WC9LMm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 628 msedge.exe 628 msedge.exe 336 identity_helper.exe 336 identity_helper.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 1552 628 msedge.exe 85 PID 628 wrote to memory of 1552 628 msedge.exe 85 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 764 628 msedge.exe 87 PID 628 wrote to memory of 4948 628 msedge.exe 88 PID 628 wrote to memory of 4948 628 msedge.exe 88 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89 PID 628 wrote to memory of 3224 628 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5c8c1ef0bbfb8717226944b671e2820d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a3e46f8,0x7ffe5a3e4708,0x7ffe5a3e47182⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1734433439758727344,9183106395120508120,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3822bb66-0c2b-47a3-9fb5-b450b41c3c34.tmp
Filesize6KB
MD578068e0657fae23b5ffac3319a9b2301
SHA1f25094ea5c43b87bf94f25b759cf252d4f0bd9f7
SHA2567fa78269ef5135d65d40c8041e4eb5f6db13c58061e2c7afecf03a5695d5df55
SHA51226d6f4fad3cc35f57bdc1be0df690d0bfe7dc1fb381d5a550d0ace2c9a22c8ccbd936850a7e747d4e01b975899662616ba4104f3334b463515835b7617297edc
-
Filesize
823B
MD51e906de1146884c806b5b025f8f3c90b
SHA1fb0b0f26ca7578a540dbfabdf2c2941393d56fa7
SHA256516faaf8af9bff4619a75d8e384922cb7865c2f73a199ea515b7762625567fb7
SHA51202ca8fcc5c9b262574de0329bdaa2f7280a9b4a0651b1174df6eb9bcea4a58a1d081d9a5e0d7039fd53cc19113641de531ab37d62094d7ea3ed17082b6657b04
-
Filesize
6KB
MD5561d5fc739106a8f6ed136d13105fcfb
SHA1db4a37c3e01b3113413f8438a54f380f205d17c3
SHA25612faa7918e4064569e3ca4f82c742ee00dfe7d2a50e34907733caaac0d5c1453
SHA512e8ffded3a74afdffc05ec47efa06fa2b8226b4bad2cebc918ccb9951392b14a51701c04000475ba7358c5396b661cd05030854cd6d91fb5bffd59923a9c22022
-
Filesize
6KB
MD5bd23042fe5612dc017a86721604c6496
SHA1ac353b2327f5db8d9f3c5946d7dcd501094f921c
SHA256e901619f6e555161a84201007a31ea09cf43fc2f9f3e8a80b8aa34bb8a473cb7
SHA512a36d68d518ab226fbe5baba9465d4ed222041732dccb16f0b919a575e32856a9bc490bf0c379307689f66d7198855f69864cf72e7e256fc35272acfe9ef34c55
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f8150899edc7b9e2df328de39de1d9c3
SHA101b67ec7f6cca5b5fb41af194eb926d163dcffd7
SHA25668769999d2740a69626af328598c1b700d080fd063faa5f702af05be13289e62
SHA5128a34cf947b20e5606395fb331c48571f92d953993cdb29ec423c7727998722f59aa8e9e125b8b72a95b8e58390215f626a00ce441c3ac8c2ed826218a96709fc