Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
5e6e5efa3e36568eb1996838d7aa2aa4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e6e5efa3e36568eb1996838d7aa2aa4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5e6e5efa3e36568eb1996838d7aa2aa4_JaffaCakes118.html
-
Size
264KB
-
MD5
5e6e5efa3e36568eb1996838d7aa2aa4
-
SHA1
e101eaaab4aa5ff89715e00dcd02a8f02cd0ce38
-
SHA256
d596d71521d4309d5f2837aa13f00c51d8f20764d916776beaa5bd07e5eb8f58
-
SHA512
79ebebce7a66e90f9161c2073c9d6e899f8712ae490640211c0a935c48266985555cacdb33d5ea2f4c83749005ded57ab534bbdbcf14bf8f55f0e2c175e58bfd
-
SSDEEP
1536:aeZjITooYmdkpLLSSNNIIVVWWZZTTmmxx66ii99XXoobbWWaaggggiippppYY88G:/ZhsLJQf43+fuqf7CA27
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 628 msedge.exe 628 msedge.exe 4884 identity_helper.exe 4884 identity_helper.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 1040 628 msedge.exe 82 PID 628 wrote to memory of 1040 628 msedge.exe 82 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 1552 628 msedge.exe 83 PID 628 wrote to memory of 2412 628 msedge.exe 84 PID 628 wrote to memory of 2412 628 msedge.exe 84 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85 PID 628 wrote to memory of 756 628 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e6e5efa3e36568eb1996838d7aa2aa4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd17b046f8,0x7ffd17b04708,0x7ffd17b047182⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3130566884986472844,12631321152733767296,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2664 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
830B
MD59b450a3dc720756f32c4c0c6131a951d
SHA1d029177a1b350f6afa2a13a83c1eb6b84b6d3cab
SHA256446f70b1f8c25d2aa0eff5725145105786d98caf02b38f6f9c2190f84136d956
SHA51256b87c527e1791b7895a1cf3104730fa8d3a46b20a8609ef8d5e71ee977bec87ef05776cfee3243ef957baf30b5f3be78102a1fbf693b9d8a10370aa4ef3d78c
-
Filesize
5KB
MD56db4b7ec33d4bb9bd6130239dbee03a1
SHA10109aff26eb645d6d78f5c5ad36faf51c9def364
SHA2560349781109fe6663173e6cedb9f2c48c72eb189e4656c2fcef9e7f873c6afb7c
SHA512df7c946ccd1c43798dc573da6b64606dd8bb50f7a2d4259e9972f78730646540b23ca902e2d3fa6d82532b5625c3efb56a697434e7b13fe084d3db6caf181a4c
-
Filesize
6KB
MD5d88cb4101fe340095e27dec644f8cbef
SHA13e1dcb7989833d3fe4e72c95bd84cd9b1bf76f42
SHA2561f0a49a37c02ec0b28eb6e5159aac2527dee430701486dd142f7e869d0c17349
SHA512202cb6f30a8b4621a61d6ef9745031fd083ff087d90e6a435b3fc4e55d937933d3983b9b056f1e134f68331c72932c0912f9de80a92a85a87eedcce676bf2385
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD568341ca0dce8b16df9b196b79d915c21
SHA1f4dc7f5d67af633de0e90751375ccdc1f898c102
SHA25684dd4d656e5237653c1ad44d457a1d6baa5f1372e963cb72568bb537bae71aa9
SHA51214d8ceadc41cc64611bdd9cf8dece7b7dd26e3e066281972762ab80a36e68fef9d95f92b120b20d816f6417375dd35fff10fdf2f65280db94b02e39742dba1dc