Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
5ce38298956345e1e5adb875ec1b6f10_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5ce38298956345e1e5adb875ec1b6f10_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5ce38298956345e1e5adb875ec1b6f10_JaffaCakes118.html
-
Size
36KB
-
MD5
5ce38298956345e1e5adb875ec1b6f10
-
SHA1
5825be49d89551693cffb0b76073c58df3f969b4
-
SHA256
1be2fd47d8734aefc61ffa2639f8bcea0d01438bc16cc02d7e33da3fe13a597c
-
SHA512
797f1523d35f33ca7b74189e695ee17763c51f52d39398d92244846d641922d148b04349c3484aaf1df13acdf33fe5f66927edd67dd4ac28b7d40807812c5300
-
SSDEEP
768:zwx/MDTHDL88hARHZPXmE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRc0:Q/HbJxNVuu0Sx/c8fK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1628 msedge.exe 1628 msedge.exe 4740 msedge.exe 4740 msedge.exe 2240 identity_helper.exe 2240 identity_helper.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 764 4740 msedge.exe 82 PID 4740 wrote to memory of 764 4740 msedge.exe 82 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1252 4740 msedge.exe 83 PID 4740 wrote to memory of 1628 4740 msedge.exe 84 PID 4740 wrote to memory of 1628 4740 msedge.exe 84 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85 PID 4740 wrote to memory of 3236 4740 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ce38298956345e1e5adb875ec1b6f10_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd711f46f8,0x7ffd711f4708,0x7ffd711f47182⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17186344685921266704,13636320543486717351,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
613B
MD5890d3aca200b8f64140f5fba52056304
SHA120afae2123936afaac56d430a9afd615892dacd4
SHA256f4ed85c943f6fd18e4593e828865f8dbf8fe94778575e9fd126b67d4d9dd216f
SHA512f694a76316c0a63f418cda2c7f33db7796b36e88e2b06444bc1ab53791fcc8ee9f5e76e3b4d98db48df5cafa96f214405037f7fe4565549b92914b29e0c60e6f
-
Filesize
5KB
MD51a0cafa10561d4b7c43fa92fb82c1cc1
SHA117365ca36d888fcac4e687a2174ca8f9dfdefffb
SHA256f13436869e3ff25241f4e96504db5d4a09053b1f0a798a9c1f039a60ca3ee2ca
SHA5126b9ec9a00e692819db7382c0e4d49744dabf6af64cab963072caa4d374f75ee3656b535e92aed2f32ced3d13d16d98e8b8fb68879b14746b4e97d1f3b4b9fec7
-
Filesize
6KB
MD5bb6f6c5d6e90c1024cada0e544876bed
SHA16d41da622deb19fc15b647fdafa16ea543c0423f
SHA25688f4acc2c6d19b56135b91dc8b4738acf4d209a9b25ba1365bc7f1a024ba9fa0
SHA5127860ed0fb7e6c6bb55d195ed8c267726ef391143356938a8abab531c072b3e317541130f6078b4a25e0dadd2bd27c04ff10bf73d7b9cc066e22b6264347d6076
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD533f8a0a5306583f724d2ff0db7e09ee6
SHA131f5906b53572991c8d2e9d6f72bc030db728e2c
SHA25619fdbeeef1a5c26172c9f911e85f81acaaeed16a32c469f57b9441e3f5a1f225
SHA51259d2f9527e6601666a3ad1f4aeba7dea19d4cd646f3f083306a0987ba07d803c942068208e1ad27b833b04cf7acf362c03cb12079456183e41eb92c83cf7e8c8