Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
5e0a82fb93f446306c5e525f46bcf53a_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5e0a82fb93f446306c5e525f46bcf53a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5e0a82fb93f446306c5e525f46bcf53a_JaffaCakes118.html
-
Size
196KB
-
MD5
5e0a82fb93f446306c5e525f46bcf53a
-
SHA1
3f31cc7fd557696ce15ec7170846043da69511f7
-
SHA256
28a1005f3c36194b1af090e2d765b1612f2ee4d8fbf3fbd61e4743f55fdefdba
-
SHA512
c65d1b47c187bb5993e1f43aff0986375327c1d133be366673f492417e5dcea9ec3cc7fe67b27f92a0b0ab3b6c46ca589c71dbac3d23a2f57aa284367624a777
-
SSDEEP
1536:ugFb87YvhuBNCoQk0ee7eQLMGGyIdboqhlTKlBy0i/2ItxvlISe2ya/NVyn/X5yo:u2QmHtM+Bx4l6Z6kdUzC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 3892 msedge.exe 3892 msedge.exe 1592 identity_helper.exe 1592 identity_helper.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3892 wrote to memory of 3884 3892 msedge.exe 84 PID 3892 wrote to memory of 3884 3892 msedge.exe 84 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4524 3892 msedge.exe 85 PID 3892 wrote to memory of 4752 3892 msedge.exe 86 PID 3892 wrote to memory of 4752 3892 msedge.exe 86 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87 PID 3892 wrote to memory of 2940 3892 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e0a82fb93f446306c5e525f46bcf53a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,4113640293444162742,7292092755380776586,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5420 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5ae7fba3618e95644a6b1471ddc932211
SHA1981f1106c11f62b4c7601e4886134e29a772d18b
SHA25626446dd5f8fb1b72e8a52eccab5265807ecfdb4ba25c8bede911f2e377a99010
SHA5127d8ad9ce81f5f6979dd87a491bddd13eecdcd9e2106d3b0754316708d0e7ca04a8a71a23107eac5f07818a21fe1b2e486dd3fdcd11700496b2350ddb06333045
-
Filesize
3KB
MD51528b45f51dec629db8d8dcb50098410
SHA1d0095f38d77c07cb5a671c244033ad68875b01e8
SHA256a39e3b47d135a7b740267beb3b8e2f7608f11cbd9c42dc807f6ac22627b987e8
SHA512cdda4a88ce1a60129b5c127b5a07b9fb3ce69f1ae875b0c3696ecd9a9c52b9244c18176c44edefe3f29e501e4a951db6d2ebd912dbf1882dc40eadb8e02932f0
-
Filesize
5KB
MD53b1cc1ecfff5d7476eda9cc4379dbb89
SHA1426f0598e61046d611dcc9905bfd4ea5453ecc59
SHA25673e5f1fdd761a54328465fa70cfe4286ff521331b3f24c7359bd8102c81ae9f6
SHA512119a252c4727c7b47a9621d85ae151b6ab9178d91df200bc1de593590de59dd01204b5af8f0b50cd584283f32f7aa34bfc72956e1bf58c47e762480af4709b04
-
Filesize
7KB
MD56650cf78ebea8df64783b4de1b64820c
SHA18357a0f03e7fb92db2cc76c942575d9058956c27
SHA25682c3c34fa0337824a708fb083a8e915e3c667471b617424666ba48848aa9021d
SHA5128380d34e1d0bce4acc88933dd55fabeba60ce1cfb525affad38a94e7c068f7142a503d24d855f534aade9cb4505b40e0a40585e994c02656373c97a14c02a65b
-
Filesize
7KB
MD55b4fa3faa065c439f881bdcc2fad64dc
SHA16213a938f2f757d1c3b8ef49db23e18b644dc536
SHA2564c58a3a03bc2784d3694831835eda3ccdeeb3f2828508f2c534b6f0aa0a2ea54
SHA512dab87092a1a3e104f39ae953373a1aa28d7a2ebaf8b4b26da1b7e3b24a0e6a19fcbd836598562453a6a93e81a3d1c6aa69f99b783cf096581c87efd8a018c76f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD527db459b0a9ea97c87ca3f764d550c08
SHA184db04edd2e4fd41953162ab35d2bbe18ace0b8e
SHA2562b6ba211fbf028976354309de5680bb13b790694f0c3eee87f90765d34cccebe
SHA5121867c2df10be7a6f448d967fd5613c3fb49062c82b7f541879d7d12ab202925d09656a1bc61bda2e09ba75e2a86cd38ae1ecdc5f082cb9d7afea2e5b76756c63