Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
5eb5b232f9a81af78dccdab895386598_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5eb5b232f9a81af78dccdab895386598_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5eb5b232f9a81af78dccdab895386598_JaffaCakes118.html
-
Size
45KB
-
MD5
5eb5b232f9a81af78dccdab895386598
-
SHA1
b377f084889e0bfee004b80ee29fa0d9a7b188a0
-
SHA256
b4640ad7f1c6c159042a77795bd86225ec65c75ff0faef9ebf32dc9cf4481f63
-
SHA512
9fd3f51b75c4c050a92328813062e74806bf806fe4340789f9b546a97da1eb6aaafdba66e118be8bc48c21175ddfb663e812dcc94de5718c65ab742ee2599769
-
SSDEEP
768:b7RgOriWNcaSoagGfOOSBrURM9LOAXhFwNukx6bBa29jpU7:b7m/BVSyhukx6bBo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 116 msedge.exe 116 msedge.exe 3788 identity_helper.exe 3788 identity_helper.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 3160 116 msedge.exe 83 PID 116 wrote to memory of 3160 116 msedge.exe 83 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 828 116 msedge.exe 84 PID 116 wrote to memory of 4788 116 msedge.exe 85 PID 116 wrote to memory of 4788 116 msedge.exe 85 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86 PID 116 wrote to memory of 380 116 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5eb5b232f9a81af78dccdab895386598_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fe9b46f8,0x7ff8fe9b4708,0x7ff8fe9b47182⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,7687969348548651912,14240802012218898153,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD53ef19420822bbbb49c9a245966269f41
SHA15a9d2f9637295fc8dedf2c75c4e1ecac542e77dc
SHA2560c0f518624cc7d9d600a748a64d2895c414a66f4ae30cda430bd3fba87ab7cbf
SHA51208d98f19e942660059a25717b288c5c9e8aff8d09845484cd6e1a4c120a0b6b09c51ef526a08d2c11bbc00210824b1b03034ba5e69c316810fa197d0b20a028d
-
Filesize
852B
MD5bb6d8696331d00ff35ec97bece36269a
SHA19708facb469f59a3a27ad8e14927c90c4f46e0b5
SHA2566aa537d79b35f7a28747dc88b12b416abf745d0752a3b960a3b648ccf18a6605
SHA512919f7ddac34fbfb6e389eb2127b07c650dee9a67680c21058ef758b3d2adc8ab418242cddb0a99d5a932a48be618303df29b21ddf212778aad03325980b599b5
-
Filesize
5KB
MD5ccf4644140a6e896aa46e1eeadfc99de
SHA13d47eb8bcb46898f1f3ff02417787c33720ce927
SHA256fcd53d46fb1a5b96c1ac8fd6a985dc234790d1a665bb56e0069a4a9f43c26c27
SHA51208880e1560ccdc834ac8bd27d69b7596a76d3cc2847128c3e9d1d6dd5c62a15bbfaddbf9883563daaadedcbc6c4c0dccb181fc52a0a312e3a0837771209f3951
-
Filesize
6KB
MD5f2b7e58d2f707c645b29dee68077d991
SHA1323daf72991c70220e1300726479621178348693
SHA256998b516eeea0f023eb11ce4d222c2bbdb91139ff2a42193b1e608a6c511640d6
SHA51235f9b0189e56c335abe577c8522f4f55b042c876203487fcab4f0a16922552a33e0eb7db327910213eb1f49c662b9f6b3da12480cca1bb1124c82e0efa5dabbb
-
Filesize
6KB
MD5e8fb6c31ddf7a5e2165430b8e8461f12
SHA1857130e21fc17dc8d7927159786298edf02f4936
SHA25648f3cabe9565ff6dccd6b33798405ec78490b97f82bfbfaff3e20d95ca6fa743
SHA51201fc15d460d21cfdae6acbeeabad9678cf68cb84e6a4c0a97775ce0b1cdc259318d8754ed6938a554b71755da10f3b4fd59502603a50e82ff55ed841c42969b3
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5ffb0c86504285781a129307eece3af6d
SHA1a3ea5d24a2a138f1d0b164a6111be5d27a3adbf5
SHA2568dc513245575542f3a39428f4032a9c649826f61eba3a578fa630a367f823f30
SHA512a72381f71a3c966495a691dc7c26fa14adfbfa547492dd336a75eceeea07b3c8c8df338d70344fb491b70b71e174c2e9ce47442612db065962a1e7820fff017f