Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
5d304bda889482ee7d6afb80a4f295f1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5d304bda889482ee7d6afb80a4f295f1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5d304bda889482ee7d6afb80a4f295f1_JaffaCakes118.html
-
Size
17KB
-
MD5
5d304bda889482ee7d6afb80a4f295f1
-
SHA1
3f85a204dbb009e3c0df64e08ec3393787c682a4
-
SHA256
1b4d36a2d3d1b6e13a9e05fd6da38a7fab0a509a9b92b1b94f8a8c49be03c657
-
SHA512
682cfa01cd74c1281f032b82c2289f624384f56520891e5356ff9f0db44c7728072724ac5062abcac75305b6a80dc523b9c1738246520c16e5b47dfb6defc188
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIC4SzUnjBhWo82qDB8:SIMd0I5nvHtsvW7xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 1280 msedge.exe 1280 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1040 1280 msedge.exe 82 PID 1280 wrote to memory of 1040 1280 msedge.exe 82 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3724 1280 msedge.exe 83 PID 1280 wrote to memory of 3928 1280 msedge.exe 84 PID 1280 wrote to memory of 3928 1280 msedge.exe 84 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85 PID 1280 wrote to memory of 2456 1280 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d304bda889482ee7d6afb80a4f295f1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x7c,0x108,0x7ffbbb1b46f8,0x7ffbbb1b4708,0x7ffbbb1b47182⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,82059731189935573,9382348014906238885,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,82059731189935573,9382348014906238885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,82059731189935573,9382348014906238885,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,82059731189935573,9382348014906238885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,82059731189935573,9382348014906238885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,82059731189935573,9382348014906238885,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5a66da4c24c016700ef34f259e2d272cd
SHA1dfc352af9533bf7e5b9056a82188df820978d079
SHA256421cb7fe90f3e2c5291e195080a6e1d453e15cc63bbe8b549c7604a75252fb82
SHA5128867613b6d8b5cb7f5ac37df5bc2f858b6298a19bd51cdb7b1bf858d013370889aeb29a4fee241d1513ca7e3a3caa65a73765d777ba309346b7a8f0c2010c3bf
-
Filesize
6KB
MD5e4cf4eef0f0001e316c67370177b37f7
SHA175f555ceda93370cebe3de00b2387a60d8d8be71
SHA25607555fec83a7b1f098c1c355a45f23db62454fe5cd9c776244a5e542a1d56a23
SHA5127e7fa63a7cbbd08615ce544d46ca1597a4c9fffa36ddf94db7577973664427e437819fcdc740884d247a1883501c9f40009ec4c20de6ec7e526615098aad306f
-
Filesize
6KB
MD59cdd6c1f93a96bb5dc8e4eb6e50f1ea5
SHA1866c7919a26189d00fac7caebc786ac8aebd0185
SHA2560eb759073cd0eed20f9c0e281900e9bfecf478dc6692653045b528f07756cffc
SHA51212e1d18b17f8a7c8de69e35157a8c0585464f3abb20a70c946ff9c0c4fb1edabb83e51bc25fcf2eceead7b18a42011592d4549e69545038159f6eac269ccd744
-
Filesize
11KB
MD557a006b6deda831206780bf9a5d265b8
SHA1558559b586ec7ed1ac8b1b174c2bd35496affa88
SHA25650bfbae5d0cdc684409fa2ee3e7b634993806ba74193fa975b70cf2bca83efdb
SHA512b8e46dda7e11189f1ff8ddf2aeab2c2e34b0d3fe820467cf3ed13e6e9b7585e58435b8ee7a823d2023d4dba1589aeb3775dd3750b8f1180655c30849ea9f55aa