Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
5e0fec5c86b4df7939119aa0c5d79d14_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e0fec5c86b4df7939119aa0c5d79d14_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5e0fec5c86b4df7939119aa0c5d79d14_JaffaCakes118.html
-
Size
229KB
-
MD5
5e0fec5c86b4df7939119aa0c5d79d14
-
SHA1
c3e345b1ce5da6963f2143861f05d96c3290d3a7
-
SHA256
8c6bf81ca0eb7d957b66188bbda332edd572050f044b8d28826af8ea8d7840e8
-
SHA512
99d089bb3cfee54b13e742765ca55262e8a6e622a7f6782f3d3851da57165cc2dd2d841c535f5c5d8669290de21e4591887fd8d9082adb1d41d32870306b62af
-
SSDEEP
1536:do0ZYZo7yAJ2JZ6AhoQp4pqr8tp9lnoZYZUU7zCGJZtJ0L+hkdCRfvV3HOC7gl:NNUIjoCzQdCRfvV3HOC7o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1344 msedge.exe 1344 msedge.exe 1332 identity_helper.exe 1332 identity_helper.exe 5808 msedge.exe 5808 msedge.exe 5808 msedge.exe 5808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1560 1344 msedge.exe 83 PID 1344 wrote to memory of 1560 1344 msedge.exe 83 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1868 1344 msedge.exe 84 PID 1344 wrote to memory of 1020 1344 msedge.exe 85 PID 1344 wrote to memory of 1020 1344 msedge.exe 85 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86 PID 1344 wrote to memory of 1112 1344 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e0fec5c86b4df7939119aa0c5d79d14_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17930217560927369824,8608865890022336776,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
6KB
MD56aba2d44778c6b2e0c585836699b7616
SHA1935670cb2bd317177ab9c0f34d6a02df14474abb
SHA256838ed117eb1ae716a38244ca4b6e78a3794cecfaaa6407d8bb05c1a797fa0d11
SHA512bead6b2f86a74106759db97fffd4ed3f5f62e00aba753cf592f086d2ece7d64b264b26f95384514be7dc0ba87a83b4d5784a853381041f76d99fc3e482831d54
-
Filesize
5KB
MD566d75ac2e012c6d35a00e7d507934eab
SHA102d530b91bcd2831e712cebc3c3e044827fd9571
SHA2564697e298521e243e621aca0ab6ea8cdf59cc35d7dfb6e37bad10073aacea23aa
SHA512863df27660a488c6ec6686bb7f5ce7a49857c6e1543a20db3158d4b4b1756fdca4c1f8e77d6593577a416350d6f23ad1eb926c248a1d49a93e4bc730f4556439
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58add6f4c274ef1f0a9e54afa1ba18896
SHA155f4231e16cb24bb455ec7684d5ddc3baabd11dd
SHA2564d85a696dc90267b657190b395f4109cdd7506c515479456e08005d54600cea4
SHA51293fe3c5d41f48b710a0d73c04c2a8589208277c0d5584dcb8ed76897834d7acc86fc2a9df24a34827e8e0254879e99f6d1d82cd07fe88e25a1cd3ec90755c9d6