Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
5f663c5d22ffa1c965ad8e88871bdaab_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f663c5d22ffa1c965ad8e88871bdaab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f663c5d22ffa1c965ad8e88871bdaab_JaffaCakes118.html
-
Size
3KB
-
MD5
5f663c5d22ffa1c965ad8e88871bdaab
-
SHA1
e38e92ace79e42046fd89b92f45769c874ab56fd
-
SHA256
906d99ff6a2f9c59fc4f54065a1db8215c08fed8c954911be534eceaecca1f18
-
SHA512
88dacce2070b0d291afbf3d5aa9857395608f60b34fd8b915a53f851ba2d4e7b052e856532d1aa353ecaffe9cf2d0f518500724345ba4dba7716ef8670a1ac57
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 548 msedge.exe 548 msedge.exe 1488 msedge.exe 1488 msedge.exe 4404 identity_helper.exe 4404 identity_helper.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1468 1488 msedge.exe 83 PID 1488 wrote to memory of 1468 1488 msedge.exe 83 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 764 1488 msedge.exe 84 PID 1488 wrote to memory of 548 1488 msedge.exe 85 PID 1488 wrote to memory of 548 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86 PID 1488 wrote to memory of 3700 1488 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f663c5d22ffa1c965ad8e88871bdaab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14032950968107602183,17586469903792488047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
387B
MD5d0fe35bed7481d93d2650d9eca94e75d
SHA1dfbb00f2c2c7800535c0af2828c6cbec3cdced49
SHA2567a9ecf203bcc963bf3c9382f4cb8a6309aa70148d1f3d7fa2361620734d253c8
SHA5128fc5336a5a341ad99ae0740b9e0158409ca936408ce7d29a5b3c1025d1ff6ce8c92b5e5a34d0a868a9ea6c3835316a411a6597fe8f36c18ffcd17214ffa94aa9
-
Filesize
5KB
MD517acb0be4f35af88a2ec4d2ecc1ade65
SHA1b975d3cd28ea727409cad87b02806c9332eb48bb
SHA25685dfd6b350b6e557c60571a1fec9f35b838a8525ce957a053b7796200781a0d7
SHA51298dfd1b30394b466c536f538feafaa0a2f9da83fe5c41310530eb0fd2e222258f1b0543d538ab60e15c111d5506e9ef2a472eb21c9f1f72d4f102f06ccb6d01d
-
Filesize
6KB
MD59aa92e6f3341ab7d458fc94c34dcd754
SHA11f30886f2d9f205c597e05ae31f5a4a2232e55e5
SHA256fffb8eb36a0dfc8974aade5e4c6606164525209d4891bd943eb534749f0d3c02
SHA5120d62dfb3c1a7973a90f249f4d421df9b45b0e954005ac4c4c00b3e5385486a993d060109339e83b12f8b24ead641705316a5b3e4844c2f2dfb1c19977a7c2944
-
Filesize
6KB
MD50accdb23c4709dba4b084eedd03766ad
SHA1c743f4ec73a2a6402089102e4db6f2f7d218059d
SHA2560eef3f6bb4df3d692c5cad91e3b59609b137e0e029c7211a07ecf73a7b3a4be0
SHA5124660cd3b4c93e9db3dbdadb690ca01c76b227bb5f55acfbd29ef4505b2a7c62965609ffc5543408a54887261e47f277e377959de7f908801b347ffe0b34dd0ee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e2baab82367ce0570968b40a65a8c2c3
SHA16984db9f2ffb764457cc760f2e6acfed9fed8325
SHA256d6ba862ba6d9d3e4927e75cd3aa9e7e310a320c0f59b697f58cdc2b509b5ce3f
SHA5125b34131c3f6c59d476dca38fa327f1e4637a40d3069a06e285fc3e5fe0944d3ff06af45c4d8bf125c96052a30bbb5202709d5f738995a243108c85385b6697a3