Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
5d72b8e839638ff7756acbd143598b3b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5d72b8e839638ff7756acbd143598b3b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5d72b8e839638ff7756acbd143598b3b_JaffaCakes118.html
-
Size
566KB
-
MD5
5d72b8e839638ff7756acbd143598b3b
-
SHA1
0a65461740b95dc38430d8a0500772af457b480c
-
SHA256
bf8a7527ddef7d0d6eb0a3f09a7f21875ca2f4271adf2c27f275f137ad49965c
-
SHA512
64702c1b02341c409ed1abf1fce51352be5bba21de01e62fe207ff10ab4adeb2a3b34645a930582ce2f70a7514fdd372b2ebbed3884ad0cf98b8212fcf49cb4b
-
SSDEEP
6144:SusMYod+X3oI+YKsMYod+X3oI+Y0sMYod+X3oI+YRsMYod+X3oI+YXsMYod+X3oJ:V5d+X3q5d+X3E5d+X3X5d+X3N5d+X3A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3220 msedge.exe 3220 msedge.exe 2364 identity_helper.exe 2364 identity_helper.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 1284 3220 msedge.exe 83 PID 3220 wrote to memory of 1284 3220 msedge.exe 83 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 2452 3220 msedge.exe 84 PID 3220 wrote to memory of 3232 3220 msedge.exe 85 PID 3220 wrote to memory of 3232 3220 msedge.exe 85 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86 PID 3220 wrote to memory of 3168 3220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d72b8e839638ff7756acbd143598b3b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99cdf46f8,0x7ff99cdf4708,0x7ff99cdf47182⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,5914416295773167953,1352141995136729467,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5520 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD59dabe68dcd8815bc6090de86bb7079b9
SHA1d4cc29a3d328a172e69d83b0412e03516e0d926d
SHA256d72e021917c144b0ecaaedca6c62956dd98968aa437607e827d9d60ceca94ae3
SHA51211012e1fb46da6fd912d65e08c493fc7355c463546fc900d175ebee4cd4d88d9c15056f1cfc640acb266d24cad2baba51c8e95a5726581e29ffac46c6db8bba0
-
Filesize
5KB
MD510807cfc35c53cbcc34a51255bf57fa7
SHA18d63c30caa2d583355953d0c079bae4d9ff98579
SHA25654dc455e6042aaa0416d498754ba0038bd84ba98d3885ac42e862f3737d6d0ba
SHA51290fc36db07dc5b8e1949fdfbdb0f2d7298f73beaf1e5ce893bd0790f1dee3d3a48e16191d90d0d4b0c6e6b61d7e24fd7c6d62e7e515bc33983c21a6b14d50a8f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56b08b51b4f1433baf01484befbe47029
SHA1e6ee3f22837f96c560a2f42f6a30b1b18cd618f0
SHA256fa71201cc5ed6cb60d8889e08a79112c6e5f876688113c8d20629812fca86ed2
SHA5122cfb7f2def6722724084b761ee514dd3e9317a553470d3dd99666039eaff677c237ac151c415ed73e767850abaaa6e820104ac50b386dfd8b47595741a7dc8df