Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
5fe3d65b479a6c5a7abf60a981b7e0c2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5fe3d65b479a6c5a7abf60a981b7e0c2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5fe3d65b479a6c5a7abf60a981b7e0c2_JaffaCakes118.html
-
Size
139KB
-
MD5
5fe3d65b479a6c5a7abf60a981b7e0c2
-
SHA1
18b103a407595249c60d0dad67f3d6d82fa4013c
-
SHA256
7ef6b0afb2026285d562fa61f15032252d2e54e9d26dff7128dec2e6c5019523
-
SHA512
481e097adb0f1d5f9a8e02e856a48b503b2c5cfd1200e974647c5ecd1747d82f2c5ef966b4d9fd06aa2613893e8e998a3a705bc8ab5f6d22b4bcb304f2330bb5
-
SSDEEP
1536:SjtxcJTzl05yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:Sj8U5yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4184 msedge.exe 4184 msedge.exe 4824 msedge.exe 4824 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 1864 4824 msedge.exe 83 PID 4824 wrote to memory of 1864 4824 msedge.exe 83 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4840 4824 msedge.exe 84 PID 4824 wrote to memory of 4184 4824 msedge.exe 85 PID 4824 wrote to memory of 4184 4824 msedge.exe 85 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86 PID 4824 wrote to memory of 1544 4824 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5fe3d65b479a6c5a7abf60a981b7e0c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec2bb46f8,0x7ffec2bb4708,0x7ffec2bb47182⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2061996496071868379,4330270656344174932,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,2061996496071868379,4330270656344174932,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,2061996496071868379,4330270656344174932,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,2061996496071868379,4330270656344174932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,2061996496071868379,4330270656344174932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2061996496071868379,4330270656344174932,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD5c48b35822cce4adfeece5a6f59fd11d4
SHA12e5d49dbcaedf9fbe4b4b132472f5a49c6311280
SHA25630810b7ec88ed250927854299ad067db86c52c05d45436944cdde6f0b0fd03c4
SHA512ef3d86e99d7c6a851ebce5ae0c103c3c8eaaf82df75019bf2be7b5aeef09e419636e17d5440919d7211dd60c08ef5c517a9b875b557850828383dafc8fc1dd7f
-
Filesize
6KB
MD57a2b9d9d054c01bf64929eedd8dff08a
SHA14fc703f7e020a88b90592262597a4e6a7d95e37a
SHA256d16805ed8b8df0049160c5a56ff7bf9c0f48fc3dd0a7d5267c109c5f9bcc39b7
SHA512789077fdd0bfc700b4883ffc123101419fc6347f44d5bd7d980987bc6a6f8e84126deeae8579ad70390bfe2a2f069c20986982ae47ec94c09ffc2b718e2e5b99
-
Filesize
11KB
MD59b201ee293a4ef2a18d7480f3e4b7e79
SHA164df06a1fb5dd3c9dc6dc818e60bd46f80796c93
SHA2562eae0a14af45726c67303e41d2589c7a8212761cf666edcb2e43d0dff83b172c
SHA51281528b3927d2e64af23a0c0cccc00d0b435238195999fba58923cb5effaf2c47d5401806ae58b23b1a62570551224c65f5b50b0b129033534b2ffa3431857f06