Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 16:04
Static task
static1
Behavioral task
behavioral1
Sample
5ff7eefbcd40d2ba166b955da60c4394_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5ff7eefbcd40d2ba166b955da60c4394_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5ff7eefbcd40d2ba166b955da60c4394_JaffaCakes118.html
-
Size
599KB
-
MD5
5ff7eefbcd40d2ba166b955da60c4394
-
SHA1
da6558a2cf5f3080d9462bac7b9dd4c4447fb6b2
-
SHA256
a978017529eafbb5e94251d26ba462a1a3d24066649e9d82d5098c2ae372b3bc
-
SHA512
bab396551c47230d9328b18e11a512a448a02f3fe785f187c09ef978d64740be01804edca5599e6974b0ba5e1152bda76fe65375b7e14e0a7ecbbab8d5914afa
-
SSDEEP
12288:BY46VPuBk/wqagr4NjAl9kcpIwjtgKsnxI+gQbTU7JjneOjSBCw:BY46VPIk/wqagr2j1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 4228 msedge.exe 4228 msedge.exe 1904 identity_helper.exe 1904 identity_helper.exe 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 1012 4228 msedge.exe 83 PID 4228 wrote to memory of 1012 4228 msedge.exe 83 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 4416 4228 msedge.exe 84 PID 4228 wrote to memory of 3712 4228 msedge.exe 85 PID 4228 wrote to memory of 3712 4228 msedge.exe 85 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86 PID 4228 wrote to memory of 3948 4228 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ff7eefbcd40d2ba166b955da60c4394_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa632546f8,0x7ffa63254708,0x7ffa632547182⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,18429303358290090389,10018575728501168589,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ebafb85e6e382f35eab323970f2331a1
SHA12a417762b6adbca082ab65a2c97d9cc313482660
SHA256c357ed61ab7daa1e34e4540cea320aa584c382d8a73e8cb038fd41a0fd1a5d54
SHA5120c9be90c8df3b6d210b337a40809acb2852271df396ccf8cf8daa77bb14f358601c3a1955d492ac7f8195eee6644a57d7ecec9d8ce27e1a7b6b0c39cedaaff67
-
Filesize
6KB
MD53ac907fc02994fbad1537bb119e7de6e
SHA19d4ea72d656e30dc8579017615ce828afcf84fea
SHA256e6506347dbd75da253a7aa98d2616f18ded3e7b4138ba98744350226fff55a8e
SHA512c506f7d69d85a59ad20d5f09a70942fa20c5079c64385f08e04dd5765a2eaadc192e9dfd4798a2fdcd30ae6ec31174cb84c672d29516bfa213a016a393d666ea
-
Filesize
6KB
MD563d378e449847262175555ad860e1cbc
SHA1b5c8dc89150a1b47c201c4dfa9721b72b09ed753
SHA256fbc8992bb598519666307142e1154ee43d38f84f0fb477e2897a38b6db9ea1d0
SHA512ab98064606415b5a95d7795909d13faca9d59e5965b23e4093ea460330c12bde8729eb88b8ed2da531d3af12ba81c7c4204912def4f061502ab70d15427a050c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD52b7182491f7c2e4a0d2a807de34d4b8b
SHA161e473fb486f75b5e7e9a8f37f45656d4ce0e037
SHA25691126d76280ea30c3f1a5fa38428e02ace167451a392ccaad2d3d4e2c519574c
SHA5127fdf538b88882890fe7ab982b6c4d6991a38be45f53290af9d33b5dfe277f7cb7175fd6987253876ace154e42587f861c94471979ead4321b8df9270558d4611