Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
5c9760eb5a0aa7260ddef7ff500be9ef_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5c9760eb5a0aa7260ddef7ff500be9ef_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5c9760eb5a0aa7260ddef7ff500be9ef_JaffaCakes118.html
-
Size
27KB
-
MD5
5c9760eb5a0aa7260ddef7ff500be9ef
-
SHA1
67165cb86f6ec728f92ec9c889fe7a5d9f9b5966
-
SHA256
7e332a9af038675316f7c654dcad5e618897a7ce6df409b78f993262e6349fc6
-
SHA512
f5274ccd23d5c6bf4e06309e9c5f52583a25486b7ca62d1c248d185ace9c435cea2e7566967299ff00741bb92962398f9ae3dfe041a72027dfc1a2ad8b9bcb14
-
SSDEEP
192:uwbsb5nVKnQjxn5Q/EnQievNnrnQOkEntU2nQTbntnQ9eHLm60PRDQl7MBPqnYnQ:MQ//adkRaSl+b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1212 msedge.exe 1212 msedge.exe 3960 msedge.exe 3960 msedge.exe 3856 identity_helper.exe 3856 identity_helper.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 4020 3960 msedge.exe 82 PID 3960 wrote to memory of 4020 3960 msedge.exe 82 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 2580 3960 msedge.exe 83 PID 3960 wrote to memory of 1212 3960 msedge.exe 84 PID 3960 wrote to memory of 1212 3960 msedge.exe 84 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85 PID 3960 wrote to memory of 3276 3960 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5c9760eb5a0aa7260ddef7ff500be9ef_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab30c46f8,0x7ffab30c4708,0x7ffab30c47182⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15557531116094551954,3774855683280865585,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD58b345e6a3dfe68d503bdd619dc55fe46
SHA1dd48c6ad12fa205eca3acf1fe682dcafb7c7de2f
SHA25617fa443db686a168c2db1cf50b516df5c1af7f0abc354d76f19f5bbd21808cb3
SHA5126e133a01c974b2cbe40a48986cb83d15cd3a348aeb37d79f4b731091106303b7e6349d4c177aa64202d88e1d57558aeccec7923df2ff157afe780aaf3e4e4dc4
-
Filesize
6KB
MD58a7a7b96459c8dabe0b5d63376af2090
SHA1198e0bdb16f8739489d9e819119cf0e2985e46f2
SHA25675377dc22cf0306a3d7f8c56d5a7bb7fa3c08d45c08bdf0193733f791a6554e6
SHA512a0806299c4165abf1cd5e018d7567b7f4380ca1791779cb777153b9ef53bf48e8b6b7f7ec5d22f15503f4bf5be06166983ffb483ff6d951e2d1202b782729a34
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fea73e4a86cefe7883d9e5365474885b
SHA166371eb07b0513b12e3cf0c7abe3218c5b25daed
SHA256f5cababc303ac54e226cca9c788048402554285fb6fba5197a158e1f219c95b1
SHA512ce282684bac4558c5b8b8862448cb017b9854233c92c22ffa5411b56b9db0b2e4f02f59c14305d4edaa32fbab4e04a24a151607e6ce9af8bac1f0c20ff190b85