Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
5d8d0c7faf21ae190e9312671bf2144a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5d8d0c7faf21ae190e9312671bf2144a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5d8d0c7faf21ae190e9312671bf2144a_JaffaCakes118.html
-
Size
206KB
-
MD5
5d8d0c7faf21ae190e9312671bf2144a
-
SHA1
6afba7450598928a0d681d927dacf02c9e153fe6
-
SHA256
e2bfbdb5fae00c3f33d74b5b99f46410469b7589f49badffb15b4b8ea402e5a2
-
SHA512
50b703c009d1d688b3dff3f77cc9c9ae276aa3ab12261cfdc57182dcf85fd85c2f39286c7da995cef7bce3e88e21b5cf6bc5d867bb49d436d0cad7a013b6f601
-
SSDEEP
6144:k530DH6NEQwjcHXxQRVufJc/0914kd+5I:kuDHQmjcxQRVufJc/zI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 1896 msedge.exe 1896 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2772 1896 msedge.exe 84 PID 1896 wrote to memory of 2772 1896 msedge.exe 84 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 8 1896 msedge.exe 85 PID 1896 wrote to memory of 2624 1896 msedge.exe 86 PID 1896 wrote to memory of 2624 1896 msedge.exe 86 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87 PID 1896 wrote to memory of 4668 1896 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d8d0c7faf21ae190e9312671bf2144a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff871a346f8,0x7ff871a34708,0x7ff871a347182⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17412100619554396099,8260879627185360850,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17412100619554396099,8260879627185360850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17412100619554396099,8260879627185360850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17412100619554396099,8260879627185360850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17412100619554396099,8260879627185360850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17412100619554396099,8260879627185360850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17412100619554396099,8260879627185360850,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD50bc36e62dd7841d92c7d064b043739c1
SHA1991c5d34dce3420123bcf9daf6633120eb7c2a80
SHA256b9a9f6ef006a47f84907702c6447ae04bb2319793416700bda72f2b19945f3b3
SHA512de20ebeedd709f923ae3507fa80fdcbefc324c6771b8ca9d9ce46bdbfb50608fb02349fe677900c5d9a822d65b21d8eee3d67bedf37cbc7df30c5cd445d40f69
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
2KB
MD5ae35b4b4caee9a226a8776b367db5ea7
SHA1c54ab1d599742d0dc98621abac0550b9d79bbd2d
SHA2562d89b6b8253b06bedb7d35e89733d410ca43251942943d779252346cdc9b375b
SHA512b414e3d4daca8516ef37f24aa7897b4cee274342e4818ff329d97d518d1af169d69187cf97c882d473401b413f5b429355f8ad20150afd212279f1251e0762b7
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5fcc4b21f478f3fc73ff623699ad57789
SHA1949b5fc8665c5b75f695cc45ee125a3cdd9138bd
SHA25671eb09a0e76a1b6380359c217aba025842057c45de21b623e38e624836955c93
SHA5122fe650014fd5b705a4b6edd3361f24144cfd07bb3174ecd4040aab5ea1299e14370f9b627d7feb4ae724517f8aad7b0d6c6d7d6ad8d8bada4be37f6fb1fd62b1
-
Filesize
7KB
MD562d8c8fbfe53428072604fc22836b998
SHA116dd48ddab4471b74c5a3740494f4cf779fbb4d1
SHA25604d746c47f0349f74086094d7e2d68ea74025dcf1c71f46babe0ff209334d37c
SHA5127d2dbd90bdbb53951267f7b40e05e091e6e7a3b1463c42aa8ef6172800896502a0662ef8761e8141c2562eaa214b09ef50e573a5e57126d22829a03ece4d2360
-
Filesize
6KB
MD543bf01382a2759b6840e949418693729
SHA10704274eda6dff578d5d991b2f7c471b07e24357
SHA25690588d0739ae4f36afaaf8b8770d1371cca5aafdd47a56ffdc1f545053393784
SHA512353531e37b9249d3a7bc84e678bd18b6249d3f7bf463bc94cc1c9dbb458f7353f60c8e7455f1a6b70ff08be75f8bf9355d90cab09739e34f4b22cf0f352202c1
-
Filesize
1KB
MD5157061050e9b9a5b35dc1aefdb9feb6f
SHA1797c7a07f0af87b322207740926d5e8341aca57b
SHA256b168d47a7e596cf404e4806556995e5894d8a5fbd5c42ad8105282e504889449
SHA5120e5df846bc29b5cd72340c850164617185e807164cfb72c06e81373f2f2c8d3f0e416fbadd572d7c82fe37f9692405e3c740b4aacb1d39c541feec4387b00ee9
-
Filesize
707B
MD55134eef274cf0a6001dc401dc837099b
SHA13f0efb164073f497a06b180201f9d20461b3677e
SHA256754505107f0a6de50d6dd0c0e5b2229c99f808e187d8fdee7a345479982970af
SHA5120f73e566cedf0bdbe11e9752a270b080ddf4f451879ff7cb05cb9be8abd6dfe7bb70b5ef0ddb836e0235014dee6ed492241ee6bfea65f206733af6997a46232c
-
Filesize
11KB
MD570bff59c42587bdae6fb09a44d89c553
SHA1ae4c5cd8d065aaa5dcfbfa71554888ae482ef0b8
SHA25652f77f930729a28776624a85a3d9a49e90d320c79ee18e0a12dab02d56cb8981
SHA512e27e9f7dd1fb52838c00854815dbc8e103f3718e1f01985f8c7a9027d3e83806b75ece0b818a909635f598ef7d9970610f4d417d74355b676b11d31e96645341