Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 09:25
Static task
static1
Behavioral task
behavioral1
Sample
5e580c8318595fbab1aadfd3e4c9c923_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e580c8318595fbab1aadfd3e4c9c923_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5e580c8318595fbab1aadfd3e4c9c923_JaffaCakes118.html
-
Size
30KB
-
MD5
5e580c8318595fbab1aadfd3e4c9c923
-
SHA1
64713ac059d7da8bc664e193c002b31f55a659d3
-
SHA256
7be2bd934979fab4090a32db18785beb039b9af2d4a9331a931c890c72ad260b
-
SHA512
1906b72eaa9982cef309f66aa17b9af06544f90eae55f484c2614324ccd419e839acd27af6380619e1da6a478e1bb968bc5cfee79ece5095c0c1bcd8251790d7
-
SSDEEP
768:Gow302PSV17Ia75H6Cq+mTACDqbpIdXHyhe7:GP0wSp6Cq+mDDqbpIdXHyhe7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2884 msedge.exe 2884 msedge.exe 4400 msedge.exe 4400 msedge.exe 2880 identity_helper.exe 2880 identity_helper.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1908 4400 msedge.exe 86 PID 4400 wrote to memory of 1908 4400 msedge.exe 86 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 4544 4400 msedge.exe 87 PID 4400 wrote to memory of 2884 4400 msedge.exe 88 PID 4400 wrote to memory of 2884 4400 msedge.exe 88 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89 PID 4400 wrote to memory of 3036 4400 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e580c8318595fbab1aadfd3e4c9c923_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2606292325388341287,529773150908548218,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4660 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD59a148ee1cf310c211b4c0e87496b3095
SHA15eddf1c7287cacee7c62ba8bccd3d9595e1ca548
SHA256cfd77834b497d7b0c9221748832e6151c50e5553a7e18c2563839e9ea3c8acda
SHA512f41e2a0a45ad8fcfbab8a5ded24cd81c2599d0616749ad13b943b7827e7a6855b66d35fff4b9c6da932ed851a3aac6a84180d6faa0a4b101b2b60e5a3eee0ed9
-
Filesize
6KB
MD59cfcc489c999a2fdd857290624878801
SHA173bb5c723044277e8b97b6c8fe02064c95e883f6
SHA256c1e9020733262813650f1a2b6a98af5a2904e35f8fffac3dbd92e123e922547b
SHA5123fb593e167937e8e4689377e825d7c1f17ccec24ef4a7c70fd6e70c5215fc4bc29d69b15aa52c0b1c83476a00b52d1334a3e7fb241d968966c8531c1c2fbf745
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55fcee1b7c2ee4476cd591343b61abad1
SHA109c056f00b8f6458eb4ef1b6374bbbd6410c63e5
SHA256936f4c29a941da79c5349feaac3f7781b9423a3088fad5d10cdaa251db3859d8
SHA51209e0e0fbd2491a0428ef64d84c38dcf46f921298bb3ae2aa0e33ed638fe9a7acb005844c7727e36528b0d6c2943596b31ef8df90df43215ee0c5fab1d9816a39