Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 15:00
Static task
static1
Behavioral task
behavioral1
Sample
5fb5997fbbe837cd6acbe93a72663d40_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5fb5997fbbe837cd6acbe93a72663d40_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5fb5997fbbe837cd6acbe93a72663d40_JaffaCakes118.html
-
Size
19KB
-
MD5
5fb5997fbbe837cd6acbe93a72663d40
-
SHA1
b8fa7a94769cd59eee7635195d60b1a872c53c7b
-
SHA256
cebb17ce3f454f65e958dc56950535f04db0d7e81b07b903b569a7523a046789
-
SHA512
c66cd8fc45cb421f9fba0de34f96235eb439ecaf7c569d78ede990682593f3e021e4f7c15f73c5e2361a9731373b8f652c8ddff04a02e7760e43d9780ab29990
-
SSDEEP
384:ziOK8vLWmkrkVBD8ciQ3RGkLjqcmWsXucfIk99helnzVc9c0GI:ziCLW5kgcl3YkLpmAOIk9Slzqc0GI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 3500 msedge.exe 3500 msedge.exe 2740 identity_helper.exe 2740 identity_helper.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3500 wrote to memory of 4924 3500 msedge.exe 83 PID 3500 wrote to memory of 4924 3500 msedge.exe 83 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 324 3500 msedge.exe 84 PID 3500 wrote to memory of 3064 3500 msedge.exe 85 PID 3500 wrote to memory of 3064 3500 msedge.exe 85 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86 PID 3500 wrote to memory of 1680 3500 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5fb5997fbbe837cd6acbe93a72663d40_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e7e846f8,0x7ff8e7e84708,0x7ff8e7e847182⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,12883521611947989285,3962285370252547528,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD51b41957280de8a006ff711f2965f6d36
SHA14b0c95f1056e3a701be31d9314d3558416945337
SHA2563a8e6c52d5a1d3681b99a60c17fe9cfeb89059dc7d436934586f06c7b4ff531d
SHA51240ca2273d29debbe54549c29430a00a2dca7a4df1ca8e7acb8b4082b524019f3927e8e06c52f9ddd7448056227f44379c96cf7f1dfb08ba4e5318b335c5981cf
-
Filesize
6KB
MD544566e732eb9e84aa3c93bac6face44e
SHA1e83b809418fd636054aaf00cb9a16ea5cfac2241
SHA2565e899c6f7ec293b0693e6dc8898ac4234d8ba679c2073561921d7f10ea0cd9b1
SHA5120a5167029a3cd6b69d5cd062bdbd61a72d7a909f2875249aaafaaefbeddaf975c2ae1be82a4a95a9111887a138c45ed78570c92a5b41867e4766886eb26b1986
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5933c9c0a5428dadc5968028323c4b839
SHA1bf2be2e66ef2b1f811d8b43e37ad1a1f09c8537e
SHA256d52058127c78b10db0cb6cb99f0a3d40a8a32b67fd15fd9f7c46f4548c48f190
SHA512deb78fe48074d47959b22573725badc0af9d892a082df12d1259b0691901407ea75be76e31d134e576dda4b91af5f3037cc03cad4ab6a25e8f4f59dce7755da9