Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
5cd8eddd14d813a43763471aa083180c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5cd8eddd14d813a43763471aa083180c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5cd8eddd14d813a43763471aa083180c_JaffaCakes118.html
-
Size
139KB
-
MD5
5cd8eddd14d813a43763471aa083180c
-
SHA1
c055286a3175311e2929f3d7d53c93f7b2f27b76
-
SHA256
4b5798ba638d8f4817343b8040067f6ad7249cf378c6afbeb80d14991ec8c898
-
SHA512
a72aec672d2f75e9b4bf89fcb3c4621262981a5b40f4eb7f3a70bc724118757fb023516aa52dbb51207eb3305983b3e9612cbfd37848d699c3af1a965bfd7612
-
SSDEEP
1536:SZZ6kxT4AlSNyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SZzxT4fNyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 1668 msedge.exe 1668 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2208 1668 msedge.exe 82 PID 1668 wrote to memory of 2208 1668 msedge.exe 82 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 3092 1668 msedge.exe 83 PID 1668 wrote to memory of 2472 1668 msedge.exe 84 PID 1668 wrote to memory of 2472 1668 msedge.exe 84 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85 PID 1668 wrote to memory of 3492 1668 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5cd8eddd14d813a43763471aa083180c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffe8e0146f8,0x7ffe8e014708,0x7ffe8e0147182⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,16439683025462154846,4910631717320747168,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,16439683025462154846,4910631717320747168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,16439683025462154846,4910631717320747168,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16439683025462154846,4910631717320747168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16439683025462154846,4910631717320747168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,16439683025462154846,4910631717320747168,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5763b55f6ec08a0e392f718a0ea1dff4d
SHA1fa8412142b3ba5f9c8b0a7ab939250e65e8ad1bc
SHA2560af08a42d4a30ae642de6cb66c585bf3f9fa031f3107b681c0ebd207cf38e481
SHA512772bdb3a3530c32e8226f7a07db3959813cfa2be1613a9992d4f24e6a223ff5369982a339105543057d2184459ab8264485e5020350ac9eec87695cc3810aa01
-
Filesize
6KB
MD5e8218aa381bd0f80dc9572fb866c5812
SHA14ddc327f3d8ed5a7f27f2d3c9451a12b3fc2abc5
SHA256dc05b5682e8c5778a9a2c5924120542819e1db70e7e5ed1f0268f92383931509
SHA512eea9f4ac72fa5de3a97b1bfde8dea9fd472c945210345683ec9c4a5861ad82ca3d0807db63b907ae135ef8926497103663a44734954d4a834c731de858c7ca17
-
Filesize
11KB
MD59fb9bddf1e6413996305925ece9e12fb
SHA11ccf8d424655f37501aa7a33f81ec275c154683c
SHA2563db0d4784a27788ff6fb04b593206aa148d04de055bc0faca0fc130f200bbfe8
SHA5120b9ae173ca8222e1137eeb22cb831fa18df09a47a4aa5f0ae1b6725258e05a93af911c16a73244d556f13c654e4f36c98bec9604aa637cda65330ad41a4ca194