Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
b5dc80ec54d9ade3490aef076863039f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b5dc80ec54d9ade3490aef076863039f_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b5dc80ec54d9ade3490aef076863039f_JaffaCakes118.html
-
Size
464KB
-
MD5
b5dc80ec54d9ade3490aef076863039f
-
SHA1
5c87c2561ceca404c503c90a5be2fb442083420f
-
SHA256
f51b47d726bc0a0ed478c6bcb1143fdf2aaa5b21c4078e0f92d7e8ba6f696ab9
-
SHA512
9e021b90eefe9c4e3b1f71b8d81f6cc932a32f004bb68071dea06c84f4b52f4444fbd6d36868724d42e9eddec788897acde53aacb8b714c6082b115cd141de2d
-
SSDEEP
6144:XsMYod+X3oI+YEsMYod+X3oI+YHsMYod+X3oI+YIsMYod+X3oI+YN:75d+X3c5d+X3d5d+X305d+X3z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 4472 msedge.exe 4472 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 2152 4472 msedge.exe 81 PID 4472 wrote to memory of 2152 4472 msedge.exe 81 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 1972 4472 msedge.exe 82 PID 4472 wrote to memory of 5064 4472 msedge.exe 83 PID 4472 wrote to memory of 5064 4472 msedge.exe 83 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84 PID 4472 wrote to memory of 3140 4472 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b5dc80ec54d9ade3490aef076863039f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffee9746f8,0x7fffee974708,0x7fffee9747182⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,15407462842882010400,15610996656094359892,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,15407462842882010400,15610996656094359892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,15407462842882010400,15610996656094359892,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15407462842882010400,15610996656094359892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2884 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15407462842882010400,15610996656094359892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,15407462842882010400,15610996656094359892,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD5e517dfbfc2ad9d2912dba70b27c742bc
SHA10d9ff1ed96292bfdc66e108890610e3621ae0e6b
SHA256a43edfe6fcf8551aabe814a47ac32d46734a286e6f81f2636c37b9b9b81467c8
SHA512ab58a920fce6c85610a44310d172ab351c20fdbbdb777c4e8d74dc581119a1b98caa97323a00e8c4be08a1e3aa5d48da647071e114c197cad0ed2cc6c14756fe
-
Filesize
6KB
MD58e88085aaef95779285d066affdee18d
SHA1a7f7942d31a73313ef8a06bd3d096c1b4024753c
SHA256471e8f99c56fb22a1471e5c18635f33bd4094135c097ad3eec07047c08c0ce52
SHA5124929446cc3c582e85099178491d64d4648c5b55440e66b0d2e873b2c276d11f16aa87bb3ebd0b4c620abcc59e06c226def42988f69ef841eab725706c0741f59
-
Filesize
11KB
MD5178a3fcbd64b2fe268bf11c72d44bda0
SHA157a6bcc296d9303f234f99220e0de4e96a1c87ff
SHA2568b1c0bc9cbff36e996c887552f52289286a2206433b271f7bdc5077aa2b5a96b
SHA5129e7974fcffdcaec3793a226dd234649ac6484bd97f51565c876a358fec66cf45eda0594b52ecda34cdd65bb57642f3b5f0fae8ddaab7b4e7722b731c0b5a159b