Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
5f151de2db18f82d88f82e89979afa81_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f151de2db18f82d88f82e89979afa81_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5f151de2db18f82d88f82e89979afa81_JaffaCakes118.html
-
Size
19KB
-
MD5
5f151de2db18f82d88f82e89979afa81
-
SHA1
f75459f3cf1cb996e49c756f22418b6e7d3bfcdd
-
SHA256
0dce2532c35843a1124638ee2668189dcfe5f514f6ca19a97d0a1238f7a396d0
-
SHA512
30519b934c56aaf54d1488a90b3c90aa059780e05d7643174c507f3b9eb450b09d73ebdb739b27d4da750398b26d9174e1f3b0d8e95d4723bafd5c450cf0ca03
-
SSDEEP
192:9K/y7Uhr4iqEWVLTgE9d35XZMD5jQt8QhbJMlUx9V6cxjb79DXS+iFZiC:4/yWr4iiLXfvQQtH1p55i+iXiC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1160 msedge.exe 1160 msedge.exe 5088 identity_helper.exe 5088 identity_helper.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 3376 1160 msedge.exe 82 PID 1160 wrote to memory of 3376 1160 msedge.exe 82 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 244 1160 msedge.exe 83 PID 1160 wrote to memory of 1196 1160 msedge.exe 84 PID 1160 wrote to memory of 1196 1160 msedge.exe 84 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85 PID 1160 wrote to memory of 320 1160 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f151de2db18f82d88f82e89979afa81_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1848018939677249872,1700232998674658368,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
1KB
MD51b226027fc7d94d6b645af1fe506f696
SHA16a7637bf8e2914f9b43064b2f014e1d5938a705d
SHA256ce1504c7a8ed6c5d16d33fdd0492529548ec9208f1caa93f21ca11578d2e900f
SHA512ba2ecfd0132c43d7ac927b01fe7e0fc44d9664503fff870b5277a3dc2724fa57b17aa4f42346165854d8fc35ee23d49a39bc01460d9ad9d19b0ef96cc7331e36
-
Filesize
6KB
MD5f8a7ff6430cc4fd7008cde40651a3698
SHA1000a0945da2f90c251f6dcc02d9d4999b2f59c7a
SHA256069dad0690515573389cab21267af7f5ca1bc32e47902212519c1430a02a62e8
SHA512c0fc622d229e7d841cacaba8b5d3882b4db8ec8b9464d7c47f244f38265e60a123e9dbe229817d2cfaf98324dbcbae928840981beed0a54e60539929ee25171e
-
Filesize
5KB
MD528286971db6ea12e1c404059a5a12858
SHA1da30c8573e2a0c5bdca7a09c3884598045bef55b
SHA25681befd5acef441e4546b3609684b0862c1cda0521d87867086fb2cc48c00830c
SHA512858b5935af6cd9dfc713692d192efe765706de7d2751fb765d8f7c29717c8e9284cccc5a710f887386b4a07134804b98f1a2f5a6f357504f0be5176d691f8fed
-
Filesize
6KB
MD5c6101455420769810226006f77476da0
SHA12e1bb890eb0117fc6e0a254cb2307451aaaf061e
SHA2560cd8ff178e614a52386f7f9dc06deb65bdefc40a0a30e0b67c8a3081064519b6
SHA512648c29f89b1797f10c9e1eeff7e52dc1c15d83b8806acc8acf0a732870e3d7ac5723ffb7d5c10cea8f788aa9a93aeddb0a21897d581bdf0f5c8518a2b27956ee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56a2ecc88391512a4f688b7935d3c3a2e
SHA13ca36dc70d6d3af25aad14366b3f29a69a4ef221
SHA25628b45bfb18c531f32ff612f1ad236a928a43a50ae6679f7aca048dd31a0c1a3f
SHA512dec929c7ec11e2dc99c2173aa18eeae764dfa937e49e28bff839523c03cb1734258ba28e30bf41df01dd5517331026cfd9fc2660adab0346bbbd044cbbc08448