Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
5cf74066f3c24fd367796dc511e96a02_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5cf74066f3c24fd367796dc511e96a02_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5cf74066f3c24fd367796dc511e96a02_JaffaCakes118.html
-
Size
125KB
-
MD5
5cf74066f3c24fd367796dc511e96a02
-
SHA1
da348689b655e9e97853a514d4bf1be16b25538d
-
SHA256
9114d63cdd16330622d119f6b32fb463f2bc176de4e79d6a9e15460136e08381
-
SHA512
4df6d1d2ca2e55b3198a2dafda9eefd3df460dab68e68fee479167073c26c15d01357c3f1593e06af4f585bf9d221377097140a5aff8a3675d8183c5b1f9a65b
-
SSDEEP
1536:SHHvGP1GBkC3RPAxlPGC0RFRF//FvDIsh5s5V688KIGRLb9JkjRZilaiQrf78/lY:SuP1GVYRDxYoD2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 396 msedge.exe 396 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 2432 396 msedge.exe 84 PID 396 wrote to memory of 2432 396 msedge.exe 84 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 4640 396 msedge.exe 85 PID 396 wrote to memory of 1556 396 msedge.exe 86 PID 396 wrote to memory of 1556 396 msedge.exe 86 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87 PID 396 wrote to memory of 4584 396 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5cf74066f3c24fd367796dc511e96a02_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc840f46f8,0x7ffc840f4708,0x7ffc840f47182⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4549892928657615672,18347562157772493975,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5ab5fc98f1d27f9c60e205cac2ec36942
SHA190db610a0c6f02d981c3c529bb79af928befced5
SHA256db8725868815bea5daf1ee2a8419b5b5e28fe5adbc5849e053ccdf07694b15bb
SHA512e01e235d27e7a167d1729ec3c6e5cc40b46d41843de10b39d98a5e4ef9b707e7eeee6e376e1530b15e9dc8aefcd0b61b420683251054f1fe267fa40d0e188b32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD55a6d03b6b4261baf278f4b4db6a669b7
SHA1c02ec3c92e16ab885015233fce401b0a600375ea
SHA2564cf95fe41c29d83044566e9067a3c19b697ecc27f2864352604a2fd535c94be1
SHA5123cd767d1e742212d5f5f989b18b75a553cdc7720017e02f189eed5dea19cd0542f85992135534f012f0066f0a1766d5ca06490c6fa30541a93f19956c002bf06
-
Filesize
1KB
MD52c7229cbf16b12d8b497bd5416879ffc
SHA10c55719a037cab9636c20cd70304d9e80d2464e4
SHA256da6780efc6649cb4060012487644d147ebe4481b9f3ab488f7f4672eae72d77c
SHA5124d236aeb4db492fa9a16656099efc936452b01c1bf7ae2baef69ca4aeb3682f94f122fb8a7d443ed1d5a40269008aa6373666677d1cbd0d15c13705e249cf070
-
Filesize
5KB
MD50cea4547180d567bd6eca2c0537fc064
SHA13acd574e2631cdde86dabfee8af6d6dd5e79ed7a
SHA256e208bf59e1541001f5a2ab8c366a9a34dc52b6acf6b3edab79a1d2a00db9e5c0
SHA51258570db4019c6e8d5395331647f9486bec751ec3d6db625fd90a90e7c7f7089760b636685ec1b5e169e00daa1d7792409ac398c98178e3b895cc68b603b6f345
-
Filesize
7KB
MD5e2f2bd8b6871167b75b0f846da155797
SHA1e788e4ec9cf57d65a681aff0b12b6b309da9e9f8
SHA2569b3d9e3ea45ec3da73c33fd8f5e6c2d0ecd50f12197f8bc5a90ec2b5c6a7e2b3
SHA51250b45ee958eefbf5709794bd58a967af72565ba3d8a6ce01c0d39e3150828f3410c191db1d615f9e077a58744b16c317e617e0d4be1a99dbf98309d7fec8aff4
-
Filesize
11KB
MD51ef604d88bc14ba5a4535518b629c6ac
SHA125925331da57751ead42c16a166fe64df23eed9d
SHA256aa3840e8cfbe5acb88e16063fdd27e4c412d530091b46040ca20691df54fd22d
SHA512e51dc700884c893132f4e2d64b46ed56e77b4f8e3d012c44e7cf01810d037b2e51378856942c7b937636aa98c7f8ba84cbf721cbeb0c7a5fa8e008f8613fd02d