Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
5d4bd497cb152d49bfcb54ba4ded9d63_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d4bd497cb152d49bfcb54ba4ded9d63_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5d4bd497cb152d49bfcb54ba4ded9d63_JaffaCakes118.html
-
Size
36KB
-
MD5
5d4bd497cb152d49bfcb54ba4ded9d63
-
SHA1
9434b79c18a0763d7bd7ece5b1226bbd646a32f4
-
SHA256
f718c7d528167e31e937cba284d17f259065f2c0b99e704d11da3376d024fd19
-
SHA512
a141a577a9cdbefcd39123a9f08c946cd9cc877007b4ed7d3470c5e4188135c64217afc42453edcc1eb419177ea8bfd62a4ceba47e22bb62e3cba636a5692ea4
-
SSDEEP
768:zwx/MDTHcm88hARnZPXeE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRx:Q/bbJxNVNufSM/P8AK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2276 msedge.exe 2276 msedge.exe 4024 identity_helper.exe 4024 identity_helper.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2452 2276 msedge.exe 82 PID 2276 wrote to memory of 2452 2276 msedge.exe 82 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 3920 2276 msedge.exe 83 PID 2276 wrote to memory of 2624 2276 msedge.exe 84 PID 2276 wrote to memory of 2624 2276 msedge.exe 84 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85 PID 2276 wrote to memory of 724 2276 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d4bd497cb152d49bfcb54ba4ded9d63_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83e1046f8,0x7ff83e104708,0x7ff83e1047182⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7475677805939443515,16258318357696358360,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0d5ae88a-012c-4c36-a109-ef3d49a9dc9d.tmp
Filesize5KB
MD5e68561ba7d65068806afe9bb3dc04666
SHA16bfffbddaeb3eb8b6480cdd75fec858ee4327414
SHA256cb5a20589619abb36f1dde141a3a11da226239204a0b6106ae6d7048749af09f
SHA51275b92a5fcd0a01e86b98dc4b511ef103b8024d9dfa49801008f433ade6a38524ca8098be207bab0b0f0fa436a538c6d4a42a59bd99f36f847e65bd221c1c2b56
-
Filesize
614B
MD5ce33056a44890af431ae3f02de4c5531
SHA152ad0e874c4ca0366eff6feca4218b79fa24bb4b
SHA25610480ffc0c4059a17e755ef00ad02cae74ecd10370d1b4ea14c8de28f80d297b
SHA5121df6f5a0838b2c648cf364a0a4951d14a88665d4603da4337b8fcbed1258860c51a588f9832fbe33b8b566a08080f92f64a243ffe5f92ce7495107514e447e57
-
Filesize
6KB
MD58b3a097c8c705b654f3f510120c16257
SHA1a95b0d5e5ce884e75441d8eeff57747b57fdc410
SHA256f7040b6ba1d78fdd9138cf055008f3b4f8bf0c3386603f19ceefcac63e3589f2
SHA5121a46bd6f79861be808a056d388bb1d4437094986ed9bdcbaba6ecf261fb492e7747d2979a09d15bcc3a9fc28ba52b01cdd6512cc75a5fe0ad83615f03db83c98
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52b6901168e3bcb2c1f15662e65e3d1d8
SHA168ccbff620ceddf0ea7e15f41c6f4bb394a189e3
SHA256299e1f07acacfc9d45e4ad3252a31628efc5b0dcc7d3b11e124126d89e101942
SHA51283457ebb015d79ae73b9215e804ea294151f666503797e2347786e8bbd05f044a169892624b1624beee863bdcfdbdb7f67f8eaaacd7a2af4fa463f0c21e4a277