Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
5e22a2f94e731fac8b79c3cae3fc0f65_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e22a2f94e731fac8b79c3cae3fc0f65_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5e22a2f94e731fac8b79c3cae3fc0f65_JaffaCakes118.html
-
Size
15KB
-
MD5
5e22a2f94e731fac8b79c3cae3fc0f65
-
SHA1
1b4e9f3b2e8fc6ff8c5633bf60a9acc1235983b3
-
SHA256
6dd03f571ecdc93385074dc7709499137ffcb10ea2fc20f6631c73da73ca89b8
-
SHA512
720c61aaf39734d1f23b87753fba046a125433494cb10f322643a8506b0963fab24c7ba96fc7d54abf5785c94e221d4d818eb0ea632965fc05da81ea5dece1f8
-
SSDEEP
384:SHBSqz2LCyt3sa63Sr5hmHov3hkfFw5GcA8qoMvuq:SHBfzAcPovXMvJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 2276 msedge.exe 2276 msedge.exe 2020 identity_helper.exe 2020 identity_helper.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1692 2276 msedge.exe 83 PID 2276 wrote to memory of 1692 2276 msedge.exe 83 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 2972 2276 msedge.exe 84 PID 2276 wrote to memory of 3468 2276 msedge.exe 85 PID 2276 wrote to memory of 3468 2276 msedge.exe 85 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86 PID 2276 wrote to memory of 2080 2276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e22a2f94e731fac8b79c3cae3fc0f65_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3ad546f8,0x7ffa3ad54708,0x7ffa3ad547182⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1646253701303892135,5792660307982498805,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1b349cae-3cb1-43da-baf9-b83975494f81.tmp
Filesize6KB
MD5cbc404ff370f4ac80b0c1f0429a9371f
SHA1403d4116a05bdcf00afeb6a435d3513f8aadf2ec
SHA256217a41779f4514da9b307b6c74a5e04bb82f91e4f3e1036c99c0d4ccdf23fa1d
SHA51262b78d253c96779b8e44c0f65cf2c33948aa46eb3cc898a887501e4e1e4ede68e1f42530dfc0c737b7b28b2108c310a9d4c28e3c530a98240c77f7f348917bbd
-
Filesize
284B
MD553e5151a229daa47d220ef9d28cc6fd0
SHA1a18279036722403b89068638786fb8b38d67aa1e
SHA256d9fa2db304661ab3856185f375da69b29acdfcb10cfd5c92fd836ad3980757b9
SHA512fb98bce74d4ff6a83921dc50ef8ea88903720925644f9aa7af038cda73fe88f859f4121cf5d1d92f4120177cc117559166d10c84efde95415a7fb9c70a826a54
-
Filesize
5KB
MD59de5514c4170c77708ee5d2c7627dfbc
SHA1617d793bae7455d197be87b1cef9f0fdb64c2fe2
SHA2561e0e67468e2011ebaae64e36a8dfb3deefc2795a97ca91f55bda5a0e4702c659
SHA512bf0d24813b76c10a4cf70cf14cf651f3ae55982f05f18673a32d8877a5e5711866c52201c7dda0228fef9f3e2b19175c6751e7e94966b1460c01427fa8d93c59
-
Filesize
6KB
MD5803153bf8dd9c515627f57726b6f3496
SHA12e88543705c8a6a2de82701e91d78fc48421179a
SHA2563c12d5c37bbee3e2bd85e7f0c0eeb0056f4364ba46c3dfacf6ce0a9ee2f1b4ff
SHA51245ff45889dbbcc7a83e2d8549760fa150d7580c92df2f2b9bcf464af676ef338eaed81a931f7329dc62e888ef0dc664b34eae4f0d0e783ca73409379b568f4d0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57818d52028406aca063a79ee62fe3db1
SHA145a7b55adf0f8c32629b26cf7f23d2e87b84480b
SHA256fbe407214c00c65c699cf37ea2e5688577cf81c04a71e896535653e7038d1592
SHA512f6e21e74347fdda7d07e204fc0977ffdaee4635ea0e6c3c3d0888ada56637c43b20acdb5abea80ceb1900ba9a47d6850f5b821fc0f839016be835f85f9315959