Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
5cc596055c9c4e39a8ab77ec6a67bc15_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5cc596055c9c4e39a8ab77ec6a67bc15_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5cc596055c9c4e39a8ab77ec6a67bc15_JaffaCakes118.html
-
Size
418KB
-
MD5
5cc596055c9c4e39a8ab77ec6a67bc15
-
SHA1
99e8081492b17f7213475c23e40c247fd0da08f8
-
SHA256
a64e418b0d57eed9eeb3bf95ef3bd38d7dae1bb1f8afad6804d9b41a6a47b5cc
-
SHA512
6f4e265e4ffb2c9c9de447508c24a9c8ffa69e38fb843bc105934ddb7902c65b66fbd833ab072c267dfd6943d6959c206a8d1d7fcbedd5f088c79719945a32e1
-
SSDEEP
6144:XHTvqmxrQXGLvM8U3gwIbl4i1llcS55C9IecYxU0Q:3TLlQ26sl4i1llcSKNfxU0Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 3968 msedge.exe 3968 msedge.exe 1020 identity_helper.exe 1020 identity_helper.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 3760 3968 msedge.exe 82 PID 3968 wrote to memory of 3760 3968 msedge.exe 82 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 2944 3968 msedge.exe 83 PID 3968 wrote to memory of 1492 3968 msedge.exe 84 PID 3968 wrote to memory of 1492 3968 msedge.exe 84 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85 PID 3968 wrote to memory of 1676 3968 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5cc596055c9c4e39a8ab77ec6a67bc15_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5964 /prefetch:82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4436 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,8115437899418014241,15950663577627498442,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5f1f1696de39a34a411ee0f03386df990
SHA155a2dfa19eb555aa0b15d2097684575e4869acb7
SHA256bb0c437a4a3e2c8e22df447664c34ff01a11d1971026aca7cacfb3b8876c1530
SHA5129fd3a0199589e0c152e149ed8c755668eaa4a914115a1027e51215a37a6369c19b07a41e8173d1a5eada423ca0bcabccf35a2fea4f947997aeb477d095e1eb93
-
Filesize
1KB
MD506f35c2862039c73672c75b58c50c700
SHA143aadd926da9493a46e0da4874c7ee361095dd47
SHA25646f977d5bb82679eae94540a072d1a58e923aa4a35100bc2b579fb9be9acbe33
SHA512e5413141dca4668447136d018313a2830296aed53b86fd5f77b8776fb7db899ea348f3d7f28bf8097bb69789b7d7f43262525b767a73960cddab9bf5381100f6
-
Filesize
6KB
MD50f8be01b56c59f8b421b615b43cb7b31
SHA1bd19e535eac1ece1e082db40a469464a12fff5c2
SHA256c82d6457dd318b4fa0ec4583850b5e62434249fefa800125e616240fa230d02e
SHA512689939b8801b5c5c94c8e3e2cacf2b2ea4aa49ffec11a7e12ee2990f33416e429bcb81dfb9cf0ddad4118bda5ff88c39491228a582e30af004e4d206131df852
-
Filesize
5KB
MD561f237760b991b8dccf288f774c45818
SHA15a65f1ad05f721b323181a6fc33bbefe0c9f57d9
SHA256da7772947d391ed824c6606e8986255adb430393bab155da7db45996d7a0a2de
SHA512a67a8905dccc67ce13280fd334cb3a8cebbc907d9cbecca1dc383e22fe8dc57c211e6c3c4baddeffdba43f0973d25f720bc9bf9550ce5e54f9ff57435f6e9cf5
-
Filesize
6KB
MD5c305987d8609bcd419a0276543c04aed
SHA1f8992d75fb23158a98c17a923eb4efc8b731ce7d
SHA256857015921bc7b90e41b05b7ed712249ddddb73629cfda0071f448423c8452426
SHA51246d1a113881e38fd5413f2900558c76439676f1fb4c4e2c417295cd7dc68e63b25f13789a05c2157bb398b5cc5d0375150077f6a70f137fb73afb776bd9955fa
-
Filesize
6KB
MD56661d1e40a661893951b081197abbcd8
SHA1f7d4083792bfe23eaab0b3e1dc8991ead53a4f26
SHA2567747eb46917d1e1e1a107474dda05bcc7377971346f56b1241a38d1604bd18de
SHA5128a6d1896af4c50889864dc8200dc24b7f6964971e4c8cbbe8dbf9182721b567d7eed4f986ab1c38273ff664a9e4f1722574f8a34923ee11b42e61c2d921d68de
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD543b010a874ff3c0a93291fb731e8503f
SHA1423fe2a2b6200d33019705425a8c9cf853774b5a
SHA256456de2a89061806977c954738ecb67a5cd9e32a34af31ffd4a9e86a2ef170bd9
SHA5129de235cb5aff1a575c2335803f98fa88e10df1b42d729ca1c071b025429c416baf58589fecb34fb84be8a5d6f20664b083f4dfddbe104097b3b0076f1a6e12cf