Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
5cf53b87575bc6d3b91ee31d764bdd16_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5cf53b87575bc6d3b91ee31d764bdd16_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5cf53b87575bc6d3b91ee31d764bdd16_JaffaCakes118.html
-
Size
70KB
-
MD5
5cf53b87575bc6d3b91ee31d764bdd16
-
SHA1
d2f38bdc40cc5627e22f8f326d9f7ebcb262d572
-
SHA256
3b8f6739c310dcb88e22402ab54131de42bf42c71a6f7aa50e100b202fd904b3
-
SHA512
12d622e57dfe3d6e5173fa0c07f1d7639c550c2cf62eed107dd2887bad7fbc03458d09225b47b9618ebf423646c7a5aa381701ef0fd0870306ca049549007323
-
SSDEEP
768:Ji1gcMWR3sI2PDDnd0g6GbLyK7O7aA7RgoT2e1wCZkoTyMdtbBnfBgN8/lboiGh3:JvjG+CasR9TTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 3964 msedge.exe 3964 msedge.exe 2316 identity_helper.exe 2316 identity_helper.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 3820 3964 msedge.exe 82 PID 3964 wrote to memory of 3820 3964 msedge.exe 82 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1168 3964 msedge.exe 83 PID 3964 wrote to memory of 1020 3964 msedge.exe 84 PID 3964 wrote to memory of 1020 3964 msedge.exe 84 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85 PID 3964 wrote to memory of 1824 3964 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5cf53b87575bc6d3b91ee31d764bdd16_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb884446f8,0x7ffb88444708,0x7ffb884447182⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 /prefetch:82⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17013405485186897663,7881034209607133314,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD537d47bc5bf4dad80a5f86952b4669fba
SHA1226709ec219800fc34023fd8debd23d71a4c869c
SHA256e34fc6d49ad023b79b3b23a5c4bdab33089d6475825f60e50180f605f92a36f6
SHA5121318ed95ea7fdaf4fb01f84ed6d0fdff0ff339acf1f2e7bbd38426fb0d75af172af73b2821ce7f9003bf4c861bd0c5eefb0ee3293873058a2b8587a44e3599a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a40f8297-9335-41f3-bb12-36f897c5f1ff.tmp
Filesize5KB
MD53c9d064b5bdbd3a0e466a3a38da0dcfc
SHA134f9596d60b020a5d6bdb3ad331f0b3a4bc107fd
SHA256626999f57149a8d19301c389f2baf28fd3b3b423eb37efe85c4f39dc7aa417b2
SHA5128eaf364b2fe7ea44187d79ecbe111edf1a94ba005e50d05ffb2db6683f48a71f3b2d78f9b79d0949fb6f837222fcaf033cc2c733fc5e776970eda078d8933c38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD555fd9d2d58f5e931333bd36d11529875
SHA1fb8f81e5bb97e7d59a03035e1504e4e0b1f2063b
SHA256fee511fef99b07410b8c88ceab144928d3c5d3878fddbade3d46a8fe1b8f46a2
SHA51204be4c42bb16026e0d7d95d1b90206549082ffe9f6b299c9ba9f3d48ced3acbe33d9b49c6ccf14dce500872544c8bc19ec86f48f182a0331883a8b2bb66656a9