Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
5e43f4f9ca49b99adc0d3f4b8b33d4cd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e43f4f9ca49b99adc0d3f4b8b33d4cd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5e43f4f9ca49b99adc0d3f4b8b33d4cd_JaffaCakes118.html
-
Size
28KB
-
MD5
5e43f4f9ca49b99adc0d3f4b8b33d4cd
-
SHA1
c210b9790f6be60d6266e4fd073d016b7997e25f
-
SHA256
c244ee1342b02add887ad70aebbccad6a9459726cb324fea8486785d37dd6766
-
SHA512
cdb757e55785e5fd9bfea52945fcdf1e23c5e50e053d979fe5f9ef3126fb5d7f5d4a83956e8fae051ac18a13ea352c0fc6d2e88500e9fd53c01e78170e070a5f
-
SSDEEP
768:Sfa1aIOIi8Toerr3DMNuer6zR5OBR5O0ermjGy/hTRQPIUQsgVY:SUbi8kerxer6oerGQ0VY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 32 msedge.exe 32 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 32 msedge.exe 32 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 32 wrote to memory of 116 32 msedge.exe 83 PID 32 wrote to memory of 116 32 msedge.exe 83 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 1836 32 msedge.exe 84 PID 32 wrote to memory of 4244 32 msedge.exe 85 PID 32 wrote to memory of 4244 32 msedge.exe 85 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86 PID 32 wrote to memory of 1820 32 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e43f4f9ca49b99adc0d3f4b8b33d4cd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7166096052430251880,16928501715037033621,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,7166096052430251880,16928501715037033621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,7166096052430251880,16928501715037033621,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7166096052430251880,16928501715037033621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7166096052430251880,16928501715037033621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7166096052430251880,16928501715037033621,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5cd3e18791348cb889eb453fd3b0f341f
SHA10f3c8c5a7c5c3d13157576190ee3106982110720
SHA256a32c3be46466badd2e7703fce1abe1ccc93a776b26bda7714a8d28d46a5f124f
SHA51275273ed5e5130e87df66281a30e8cc908af26064c8e25f8664ec85fc3f07ff3c0706c6e97a56647cfe4147f4b4db9855ea68f064d23f02c628bd93f850cf9450
-
Filesize
6KB
MD53396d0e4f8523a4f044977227e462b78
SHA110056b19716df1ca59921a5bd2db91712a6f2e92
SHA25603a1473d26b3a3193f86ebf354a1005ec352dd28d4c97e0f986c8d970d885731
SHA512825166d9e681d5b0868dcb99d86613ba0778a717fd6c7fcf3640e2dfeaf6dfd5330d2219352dbe2e0fd0be8b1e738a3078fbd80f140bdea1c56128b03ec4e043
-
Filesize
6KB
MD5bdef8c2cf21554a7293df38f7dfce5ab
SHA13419ea8da532964d681d0a78f6f4b8359b0564b1
SHA256126858afa6b654bda9b7d49a23c867817f956686269b84064eb990571e1ce508
SHA5123614422776032af0e8863c48772fdb34d61d4b13ac63859ea0ab5096f1a131969b61450c967332d2b2fbb3f436978b14ddbd7224d9194582546589a2a35898e8
-
Filesize
11KB
MD554f2b174fac5d07d11cd3dbd031dea19
SHA166ae8ef443db68b9e9a3cc064d4025c2797d69a4
SHA2569eb31c4896f62f6606dd05648b81c3b57df58ca9ec18a63d69aef5bdaa116354
SHA512d1eed6f70b814982a8595f974c0592010a6a4f71202f11b9062a658271d130b4d844694135759849d6cf8a06a51db0c4deff26df8a1e203e1d2488f6f8870bd5