Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
5df1f57471f02708fa5301967812d885_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5df1f57471f02708fa5301967812d885_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5df1f57471f02708fa5301967812d885_JaffaCakes118.html
-
Size
133KB
-
MD5
5df1f57471f02708fa5301967812d885
-
SHA1
9b4b688ff1f8fb86d6e1bb51cac7d97a20e4ac01
-
SHA256
9807f13f40413de7265c65a5fea2bcdea2b0776d23beda47fe14141acde51122
-
SHA512
e7d4681c302fc0eed19084cbcb060946260235652776f072251eb2d1cfaf0fffe5e37ae867c729db82e1f4263f1bf232888af2c8f6f7c7047316941aae132721
-
SSDEEP
3072:S97ZjxDp3OQ3kpGYp2znSjAEr+b2daqNLmbDifHuafWPRTfE:S9FOQ3kpGYp2znSjAEr+b2daqNLmbDiT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 4008 msedge.exe 4008 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4008 wrote to memory of 3076 4008 msedge.exe 83 PID 4008 wrote to memory of 3076 4008 msedge.exe 83 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 4788 4008 msedge.exe 84 PID 4008 wrote to memory of 2336 4008 msedge.exe 85 PID 4008 wrote to memory of 2336 4008 msedge.exe 85 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86 PID 4008 wrote to memory of 4268 4008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5df1f57471f02708fa5301967812d885_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4ec546f8,0x7ffc4ec54708,0x7ffc4ec547182⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2719557379646173433,14645893975433946377,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2719557379646173433,14645893975433946377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2719557379646173433,14645893975433946377,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2719557379646173433,14645893975433946377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2719557379646173433,14645893975433946377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2719557379646173433,14645893975433946377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2719557379646173433,14645893975433946377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2719557379646173433,14645893975433946377,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8a680b7b-c110-474f-a343-b20f52c7dfd3.tmp
Filesize6KB
MD5f5c64dd1cc8aceca7414d86eaa3e11c6
SHA1f6ea4b92b8095b1f6f33c095cf5a2f651bfa3a9e
SHA256bbc712c9cfc78c00d987514949317f395d975d887cfee57b4da39c57fe934551
SHA512ec602d47253be607f3d492ca2d264d3777b2830e3b039909f05f970c55362d373bf2931c6341b4a4df0de40d1939f7c200fe442a594d00d2022f4fc7716e969a
-
Filesize
304B
MD50416dc77c2f25db3b9d33e0eb8907e4c
SHA16c3fdbbb66d48e41cb68ce619591079a3b4113ce
SHA2565dcf14717ad1983dba71e30986e4357dc923047057ac2125d2332f15ccfd6d07
SHA512ef96b25cce53f937173398ba56ff3959044510975f93aa1a66fe140e47ea3b8dbeddce62fdacc43389b570aaefe51f2317b3ac2553101facff440e125910bc27
-
Filesize
5KB
MD5a199b7972ddd33a3ea573a44e3807f3f
SHA19ad153aff9841cae25816e7b329a5c0bc27e8177
SHA25690921641369d6960d7866f49f2e17881967743020adc32b77f045e187155e230
SHA512c4727f93bcc062b55b8cf68fcde0027aa921ac5cb90bc77320971f0a3fac2d4dbcb53a6a59a5990745b514068cb3f4dedef9634bc360f685171b60c03db6119c
-
Filesize
11KB
MD57cce80d1bf146a21b55e6d63222e0902
SHA1566e6ecf6544f0af52951d51cf546f44d6be368a
SHA25665c02d9b5c93f4dad5e3426ad0fa5c2c0d9ffebcf65a482475244c506acdaed9
SHA512bc435615fdb5b34ff86ff8d71f4c13531f9f5eb05cb933c72d8db42f0407e940c218fd469049ad47b11f24bc4ba28c334432e1abfcdba122593393e48e9279e0