Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
5ced022f386c97eb4c9232ae5f646d30_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5ced022f386c97eb4c9232ae5f646d30_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5ced022f386c97eb4c9232ae5f646d30_JaffaCakes118.html
-
Size
8KB
-
MD5
5ced022f386c97eb4c9232ae5f646d30
-
SHA1
d0cd066d8f3b6d834b72a2edc114c7f51555e549
-
SHA256
1c99905d332b70e979b79a45b72215aaec29d1ff5e35b0c294f9a65d8e9ed6f4
-
SHA512
d18f500c0acde9f4a1846d3bd338fd3d70874384d8f1ffe1060e5a65bda7dc9fd1f1c28a8deddd64872ef51647c61f30c2fbbc604148fe7543749d95b0ca4c76
-
SSDEEP
192:iz4McENdBeiQPrTZbfPYRY3YLeYjjlhTZEyIbBRq2Eb/8ChqcpllL0YRbiELcezD:iz4MbSVfPYRY3YLeYjj72SFdllQYFce3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 1340 msedge.exe 1340 msedge.exe 2836 identity_helper.exe 2836 identity_helper.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1764 1340 msedge.exe 82 PID 1340 wrote to memory of 1764 1340 msedge.exe 82 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 1516 1340 msedge.exe 83 PID 1340 wrote to memory of 3452 1340 msedge.exe 84 PID 1340 wrote to memory of 3452 1340 msedge.exe 84 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85 PID 1340 wrote to memory of 4212 1340 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ced022f386c97eb4c9232ae5f646d30_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6ed746f8,0x7ffe6ed74708,0x7ffe6ed747182⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2168 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9253123637731436544,14210891086751112295,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
1015B
MD5dbd3091af54ca192aca4b00469277d51
SHA1c08a5330a8c89e16dd5efab3f53eb34503477c2c
SHA2561e1715db6a504d8da03c0074af4613f981485b514916dd945e8518f58b4c9f06
SHA512c800d4dadeb626640025f6f8037835af3b668ca786ecd968efd2b2a922f6b0db9050e804f98cec6edc5aaeef08f8823112e101fb9972c68c13b25aee56524ddb
-
Filesize
6KB
MD5b5614bb01abbe2eb7783ea0d02193729
SHA12dfea7ad33a1abaf660c6665455e0f9623d601b8
SHA2568ff18903a048920491747caf2ff0ea7501ecae50c5f70e9a22b7fd9c3528e35c
SHA512f224c1729edae072d6412908733915708de059f08bd71c06bc5e996ac2733110b60d2aa1b1f05e181ac0bb83e5b98831a1b6bffffe08b070b2855dfc43bcb3f7
-
Filesize
5KB
MD5af93a895495b6fe1e2704bdfd76e7687
SHA1a5a2bea866360a0d8587772cf3ad7228f19bac30
SHA25610ca9dfe05537099178d355b881d5484538929a25e89932b345ab2d3724e80d7
SHA51248316a70433a5c6bd1077099090c5de1e7b4f05165eb4c2323fadece7300c4e8905527455b80da2248b224dd10cc537b173358a22a56527d33425599055c896f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD571f154cc33b4a07a9e7f15f67bd01d87
SHA1169d56deb93f8f666e3c2f29413cf338db066523
SHA256d4d374df456c9017da5fd6aa2f896c2b8157ba45ddef84a24432e5848ccb5b86
SHA512cc52902c547e6df039ceec28ef48578c21445d14cc4526584cb76a59a0d368a232c273ae5e6a7005fd63b6f98a0e27c6fbb1dcec723f72318285bddede9795b5