Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
5fd864dcb6c7fbcc14ae0bcf83e51527_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5fd864dcb6c7fbcc14ae0bcf83e51527_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5fd864dcb6c7fbcc14ae0bcf83e51527_JaffaCakes118.html
-
Size
19KB
-
MD5
5fd864dcb6c7fbcc14ae0bcf83e51527
-
SHA1
ead69ffb2615c7fdd9f9222a8638350e6c2becde
-
SHA256
0e2efc8dc0744ea4f9f393b99e56430c2dab7c24e078ab6ce8c818580f5172df
-
SHA512
f01b12ff6a6ebf4ba8da13963084cba272c5b3ba09fb8ae3ce443603e821922c1c24a3bf435b3f0f7ef08f03386f7ca819b845d3e05182a683864b70a308cb46
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIJ4zzUnjBhlv82qDB8:SIMd0I5nvH1svl0xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 3972 msedge.exe 3972 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 4804 3972 msedge.exe 83 PID 3972 wrote to memory of 4804 3972 msedge.exe 83 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 2380 3972 msedge.exe 84 PID 3972 wrote to memory of 1164 3972 msedge.exe 85 PID 3972 wrote to memory of 1164 3972 msedge.exe 85 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86 PID 3972 wrote to memory of 4476 3972 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5fd864dcb6c7fbcc14ae0bcf83e51527_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffad9b46f8,0x7fffad9b4708,0x7fffad9b47182⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,7183063447773096824,13816965913507256663,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,7183063447773096824,13816965913507256663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,7183063447773096824,13816965913507256663,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7183063447773096824,13816965913507256663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7183063447773096824,13816965913507256663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,7183063447773096824,13816965913507256663,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5ed2edb272fc3943be89620bf8c4eccd2
SHA14fa295214267cbea09e7ecad42b3938381490a66
SHA256d42004ad72e902ecc056843c4fb9fea0ef13cf637af9ba8ead81e2593c8daae0
SHA512e5ed06e95d9da2809d32418df41d5d736a476b9cd98a670e628b6e35bbb2d768f0a00b8fd125da0d5e824132e7be5e251c2130d3a16f52b9c2c809207771ef54
-
Filesize
6KB
MD57b526a4635b672ae2f2c74e22f359674
SHA1f284c43b2a0b666e40f22c9210f6319d88ccbe77
SHA256f230984b96198350c1ac454188609a462227e1dd2ffef0e5236795213b96af93
SHA512c1ce2d873e2dae8286b59e7f3a2519fc93c88f82b1ac46e19ebf6020ab17687320f3d415803b6003fa0a07c8dcd5eff1906e8003165eeb96c615608b052970d4
-
Filesize
6KB
MD5cbc9457082909d046fc406f88e22e813
SHA1ffb13a197c4c6080a71a0aefed1c23c3bd1155e7
SHA25636e392f0659abace338cfff41e72f2373bc91ce00e09382be94a527e499491ba
SHA512ce1de9fd943ae1c19f06ceefe2d4dc0b26a080227da053c794dc5143e4e0d7a209fbcd6621391cc8e0109ea9522832b713094f251c9d7f593338062d8c2394f5
-
Filesize
11KB
MD51156b9e495977c82c0e52971b0493d57
SHA167fb7f27bbc5938a2c4cdac3a16744d3f7f52251
SHA25693180edf0bb23cecd907495018fe70a996993634edf9507111fab3026cf07312
SHA5120abc7da348bc448988af2e5844316ef41a28c73b724e756d377b36f81dd1781736bb2748dbd3661a88b8bfbd2b3cb1c2cd376baa933c77f381049aa31d8d8edf