Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
a5917dd3fd2ec45d507152f91a8a7a0e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a5917dd3fd2ec45d507152f91a8a7a0e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a5917dd3fd2ec45d507152f91a8a7a0e_JaffaCakes118.html
-
Size
36KB
-
MD5
a5917dd3fd2ec45d507152f91a8a7a0e
-
SHA1
f1b1ed1698545702f08b83dcf3c16e74c5bac543
-
SHA256
25fa833be9bde047d6b5c3859ee0e585ae249132d2296847256b4007dcf1c78f
-
SHA512
5c8afebef499c7f304ce65ec207dd9b476e4563544bb9f17ce3ea7aeb41668e71c95a85faf02243f1aee79a4f7b2d5130189454e84575ac991f6bfab55347aad
-
SSDEEP
768:zwx/MDTHJR88hARZZPXAE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TyZOy6u3l56lLRV:Q/jbJxNVmufSI/S8VK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 4084 msedge.exe 4084 msedge.exe 4316 identity_helper.exe 4316 identity_helper.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 5100 4084 msedge.exe 80 PID 4084 wrote to memory of 5100 4084 msedge.exe 80 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 4648 4084 msedge.exe 81 PID 4084 wrote to memory of 3664 4084 msedge.exe 82 PID 4084 wrote to memory of 3664 4084 msedge.exe 82 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83 PID 4084 wrote to memory of 1872 4084 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a5917dd3fd2ec45d507152f91a8a7a0e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c0a746f8,0x7ff8c0a74708,0x7ff8c0a747182⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15783805086796243652,14087882045646541416,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5527249c1f8e580e3e3fcb09cd39fe703
SHA1eed98ec331059b10e8986137e123f1c5213dec7b
SHA256a38c29089a1038c14843cd1d3ee270879a72f23dd4ff8b6dc788e89f4df8d455
SHA512fac19c3da09a276d9955d96f048db13aebc21292501d4120ee0421cb0fbac6cca97a39155c0ef3be0b7d48c93c70d56aad2875e544ba5ac52848e4fc77faa5e2
-
Filesize
6KB
MD5e634bb0300a444273bf5f82b4e451165
SHA1ac5d0819b7d300ac2f5d96f50e230467f418bda0
SHA256e4d17ece3f5722138991117c9b10531b48c45bd6e5c130ebe7e1ece175097823
SHA512215e5e93d5f3ba8cf207655c2376b5f4067de6ec150a478a93db0e489248455f14a4b241466602d4f323a30eaf44c29c74438aef36abc6504ad9336893330869
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5183982ed1f543a4ed2efc69a3164e519
SHA14634a16cb66529462292c95b67cb8bc160aa722f
SHA2567802a4c72c20e5c4fafad2d6a596681e8c09d024cdbb66618b8d70b82094adc1
SHA512f7851e4117412b388d2f05fb5021d3bf17ecb818c71b95c617623b532e8272f033730184511708ae546da2e1fc0b4aa6f0a3eafa455156e92461a7fb9a7b9ee6