Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
5cffc92b40a1f7ba14328860a3c2bfe0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5cffc92b40a1f7ba14328860a3c2bfe0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5cffc92b40a1f7ba14328860a3c2bfe0_JaffaCakes118.html
-
Size
34KB
-
MD5
5cffc92b40a1f7ba14328860a3c2bfe0
-
SHA1
bf47f58e040c0002f1deaf3d9441a97216cabf93
-
SHA256
3be616ba240af9a9ca4bdbddc7f8421d07f689f83bbda6415ffdb6474d416045
-
SHA512
9cc02ea1a2b471c12ae8eda0f29e1408a2462527c2128df0b1e1139d34d3d40ad400839f421894cadc6ff769f1dcada2f66777fb0bfaea4eec8cee88948e8a91
-
SSDEEP
768:2yThijIT7aq05vz1f75LkHy1zvExAHNab:2gijIT75OvLkHy1zvExAHNab
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 620 msedge.exe 620 msedge.exe 3996 identity_helper.exe 3996 identity_helper.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 620 wrote to memory of 2060 620 msedge.exe 84 PID 620 wrote to memory of 2060 620 msedge.exe 84 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 2508 620 msedge.exe 85 PID 620 wrote to memory of 4708 620 msedge.exe 86 PID 620 wrote to memory of 4708 620 msedge.exe 86 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87 PID 620 wrote to memory of 216 620 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5cffc92b40a1f7ba14328860a3c2bfe0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9924846f8,0x7ff992484708,0x7ff9924847182⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,13444130800651904005,5081490562617446733,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
187B
MD5363f8beb6ca49afa2094ccce7f4fe76b
SHA122fb6375fe18a602902f082f88f652cc13d7f5d6
SHA256f8b2117420fba3a45dd963d15d0402d344087cae9765ef3349cad17580ae2d93
SHA51205984d66df1946f4af3a41318cd18854fff4e5bf05edb6129520b68a0053320451f790b6639015dd25e3a36beef84d1d51d0acb62962622416ff3f4a46ee2e06
-
Filesize
5KB
MD5f173b1be6af609beb2695d262a41420d
SHA114dac18a035a5400c328083e37787d0b660aeff9
SHA2567527ca31beea1ccbf08538b57c8a13be6669f3404e4afb702fd40d0581c91413
SHA512309267d139fef17bdf9fa9a72436e278df0b40b79c2d1d0b7502e6de6a1ce252cba59d852ae2c8c877d5242d8323e7537f8d29ba748a581090e91ee57301493b
-
Filesize
6KB
MD579674f48b6599876d2285873f328fa5c
SHA10b33ada5604bf8592c74e1b042a8b750f5c82457
SHA256fad4d0d68973d0dc6ca04eeee592c03d4d53419f7359fd2f19edeb9848cb6af0
SHA5125ff06011e637ab9acb15907d69221e1f29dce9e60274dbc3a41dc522054769bb64981637f7e9a5774c345b17950c6822621531c79fbb3aa29792f2142d54b88e
-
Filesize
6KB
MD544af53e5db8bdf0ef21110d9ab3bfbf4
SHA1b8f944cd49fdc40cdf592145989fc0f140f6d25e
SHA2567da6559329e31b17535d7b2494a9a208f44c174d8939046abe855053367c8621
SHA512a4aec0afd5923f7e22584d9bae9170ac84743363bb33aec737ae942630a0ca071df9c819e287c06245ccde04245224a0aab49c297433c1bb8e10d19d1c2aee33
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53d08f963694d123dfd39af7877fe8ec0
SHA1053c818f55ada4aa82c64f9e8a772c5a7f80af6d
SHA256f99401a44ff4ea7b06c8c34d6adaae582529c60a7135eef95d862c12a2fced4e
SHA51257bc013fb832bd7ce11b7c1a7ec0fdabd76ff31b7ad7f7d2f258ec62e6701a5c9edfeea8207deb7b75497fe582b6d1dc45f1e6bc2d04d65bd951c691f0c48f27