Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 12:09
Static task
static1
Behavioral task
behavioral1
Sample
5effe9930e235e328e36178a5eaa26ae_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5effe9930e235e328e36178a5eaa26ae_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5effe9930e235e328e36178a5eaa26ae_JaffaCakes118.html
-
Size
11KB
-
MD5
5effe9930e235e328e36178a5eaa26ae
-
SHA1
284c8a01964459d6b42b5dcc0b0410f6715bbd24
-
SHA256
9da3d6d035612212ed453a28618669c86f3d2d5e42af19a8c950af498b7da354
-
SHA512
f1c247a853ab82b6d15dbf8b4f4cae919552f1e56a668049eb5b2e7e9637248565a6875301d71994992097e8be551403260d5adc1709979500d47002ed99f961
-
SSDEEP
192:t2zjgic8/FRYOrmCPTWbiD4/+pp01G0e0/eaqin9XCLEuUMzC:Mgic8/pVDUleQeKyLEuUMzC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2888 msedge.exe 2888 msedge.exe 4456 identity_helper.exe 4456 identity_helper.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2524 2888 msedge.exe 83 PID 2888 wrote to memory of 2524 2888 msedge.exe 83 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 1320 2888 msedge.exe 84 PID 2888 wrote to memory of 2076 2888 msedge.exe 85 PID 2888 wrote to memory of 2076 2888 msedge.exe 85 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86 PID 2888 wrote to memory of 3728 2888 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5effe9930e235e328e36178a5eaa26ae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12ef46f8,0x7fff12ef4708,0x7fff12ef47182⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,5405779185878043929,4054904345532963083,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
472B
MD51afa2c2a9dfa5f14a4fecbafb99013d2
SHA13c4833886c8e9c98f284e2f2678c870d605aba3f
SHA2565a0cd5f62c1c9c675a567cb1d008d12a8aaf200f369cc392246f34647e4a15db
SHA5123bf8a1caf352f6750cc48f4a3080e4bb276e528ec9d66b5c19ed56b1389cebb798ecbd6664c6f70735c206f5f3198f2e13a7264b9e4af30c6351cc8ae7119606
-
Filesize
6KB
MD5a55f7bf79b788cde9c408b8b9f32cfca
SHA1329c4dae2f07cf5f4900a0e7ac226661c0d39535
SHA256980f4532b4d2b634fe70fdfd0045b61956061404e1cf2f6e78fdf2813490e7c1
SHA512021064bca7f748bda30910dedac97e0711d75290baf254394a35b27750e681e8673e3114558e24c1ae2769d8deb0d37ca622ce1768ca05ed2fb21c9d6262468c
-
Filesize
5KB
MD5612fe7d128a577057d21bd9758e21399
SHA11a4d8b12e437e9cb3b57fab835c97dc4fe59b2bd
SHA256f89530f2663c2fe9c750a8c0e25447b8ccf5e13f04601c295f8a6bf5c1643f3d
SHA512de607ea73b89bfa9e5f23cbf2cf65ee8de99ad4e9b7441ce0784723947f96d31282fe870c8292dccdc4b1911e9da6d2b7d3ae4db75eb6b9ecae8f6c05da501b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD585a26cff174712dbc213158ae5cc06a3
SHA1333dbf3863c1260ad2d103d9a03133f3423fa02b
SHA25689f6b105809abe71b629973d7e82c2d54421e00bb839a7cf023a30d9432417d8
SHA51245b816b49ffe74e3958ad04262f08837d2877314db643d6e0af285542cc5c72ad25970306d69429b3d0dd3ff91331b80d0a1039b1373d42e232f2003e6f0514a