Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
5db22a823c10e15a47a178617aa6572a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5db22a823c10e15a47a178617aa6572a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5db22a823c10e15a47a178617aa6572a_JaffaCakes118.html
-
Size
34KB
-
MD5
5db22a823c10e15a47a178617aa6572a
-
SHA1
47f8613ca50ef6c85ca5c3e2d194627b5b61b23a
-
SHA256
61f004a6effafa3f86100b42221b8955bf430415e8218b0e6cf8e02b0d4750d4
-
SHA512
4374425b7a0d70d1a3b2bfe2a9940afc0bd3b9587189a5c56612d03c49104df8acdc670602b9394ac49a0a518a472c3a3ae85085d08a3824351593de011a3be4
-
SSDEEP
768:hWdQwmXCbXmAIXcB2UYQapW/NBl/NA/NN/NW/Ng/Nc/Nl/Nr/NA/Nk/No/N7/Nq8:h+QbXkXmA1B+BpWByz8aavVW2CtM18Wm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 3048 msedge.exe 3048 msedge.exe 4732 identity_helper.exe 4732 identity_helper.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 4072 3048 msedge.exe 85 PID 3048 wrote to memory of 4072 3048 msedge.exe 85 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 4856 3048 msedge.exe 86 PID 3048 wrote to memory of 1816 3048 msedge.exe 87 PID 3048 wrote to memory of 1816 3048 msedge.exe 87 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88 PID 3048 wrote to memory of 2164 3048 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5db22a823c10e15a47a178617aa6572a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffc114846f8,0x7ffc11484708,0x7ffc114847182⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 /prefetch:82⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,17131787762655232057,9326076361866527645,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9f221c16-96a8-47fc-b8e7-69dbb936ded1.tmp
Filesize6KB
MD5f521b64254ce18c8a2a80522e8fc37de
SHA1d67745157d93a6ee74cf51c1dd5551e4e0b22015
SHA25662bbab9ee5e8372f3015f1a7c5d53c4095f1f7368f972f6f7488e1e5009b3cdd
SHA5129b2f3fb71f6f6362766de5d94e81cf35a7f5801303d44ecb59a34ee6c772a8f55f8ae9a4981a5c54bc5118b09672d30573161bf00948d23c32ed97f3cc6ecf69
-
Filesize
381B
MD57c6600028dc089d1adc460715ba36308
SHA135b799e3b761a3c52dfd465207d1e34f4e9ba1fc
SHA2563fda8e0ff4123d9ffaa13334625a182c255f0431a4febe9f848d4e0cfe0f7d11
SHA512b4a0da8d2e12a5d41c1aa1202ef8a1a48b9845398954885f41b746aaaf5e00ce1be0c7c5e20d74b72fe545a26665fc4bb211b034a120748da5a07ace69b53365
-
Filesize
6KB
MD56754f4b52842afab7b336d74e025ffb4
SHA13514325e0459daedce1eae5ff9a0a01c46197224
SHA25675fef0441b579915961c37e7ffe25dd56b50d14f7c609e9ede6a627ac3ad33ad
SHA512af9cacbbec14a0d8154685d9d53cf609b172318b0b8b1eda44eca097c400e2dca4e29685a2fb81ee711bd23244ef784a053709c0912916651d05238165638ddd
-
Filesize
6KB
MD5767891d1a23e68b91aea9758146eee6d
SHA1e4fbe3d499ae54c0b3b142279f9c1170e9a6b9ab
SHA2565eba35bfde9c75fb2f8262519fe1e3244335f74c2d5b0af8e6deb5623af67c87
SHA51275352541ca9ce9aa24a970543685c3dea37292ae229fad2b680cd8c8155c317017d63cb9bacfe62030bde8380b966a6cd2cb65ddafd291452ba377e033f8679d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5834a22f65b9485a19cc8318c07b22cb0
SHA18ddd1cd257dcdb910dc49ee86b4b48951c15253a
SHA2569467003937c966c90093cf0665d809e3b668859e289e0efea13db0623d6a9d4a
SHA5122ef3421a34ef8c0c8e75cf91d3e002c3216cdf87a9e499be653cd4353ff13f971a218c0cb8a753a67780214f152bed2549abcc7cc08fb4f2c8f0dbb5601dc850