Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
b5d69dcf4af07da85e4f65900a0489ff_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b5d69dcf4af07da85e4f65900a0489ff_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b5d69dcf4af07da85e4f65900a0489ff_JaffaCakes118.html
-
Size
18KB
-
MD5
b5d69dcf4af07da85e4f65900a0489ff
-
SHA1
ff0b1af9d6486fac48f4f840f2b4921ea6a20fff
-
SHA256
d66c729c2dfb7cc6d2853a3b45e1050f009f97ceddff338b065a22078528aedf
-
SHA512
c5b907d1dd94732371d12347f789ab3ed70ee4cc6653659ae0c638e256c6dfc7cbb31631a4c08a4415a9c9dc855a460fc62be4c8b0382a15ecf5388435e5dd3b
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI840zUnjBhga82qDB8:SIMd0I5nvHRsvgZxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 1820 msedge.exe 1820 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 400 1820 msedge.exe 82 PID 1820 wrote to memory of 400 1820 msedge.exe 82 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 2860 1820 msedge.exe 83 PID 1820 wrote to memory of 3020 1820 msedge.exe 84 PID 1820 wrote to memory of 3020 1820 msedge.exe 84 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85 PID 1820 wrote to memory of 516 1820 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b5d69dcf4af07da85e4f65900a0489ff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc80da46f8,0x7ffc80da4708,0x7ffc80da47182⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,7992501893130060728,2568785673559994626,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,7992501893130060728,2568785673559994626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,7992501893130060728,2568785673559994626,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,7992501893130060728,2568785673559994626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,7992501893130060728,2568785673559994626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,7992501893130060728,2568785673559994626,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3408 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5c0aa31739830024d7f6088851a164cef
SHA14cf33253db03474b541777bfd529d22eb79d2062
SHA25678e8ed1e035aaa60674f278e5ac31f29f964254c74cc499f7f165e49f7303f85
SHA512dfbb5edf1755a07d75553b2b94d639b5a02a48d9a4a6c674ce6daacd26f601f13aad0d27eff44367f687c73c75c03ffb60535b0d3e0c81b3ca9bd788b5cf28ca
-
Filesize
6KB
MD533c17bbe957179f06816fea1f902931b
SHA144ae73699ea5dee698bbae32516376e577646015
SHA256601a4a2e920922832ce93bcb88ef3bc72e9d1720fd90125414916be327026879
SHA512badee3b064f416f2041a44e79ad0e5c7605d27990b9cc40f73a454af95385ec8630f6a02b8b3c562c0e52d23461a53b6aed31041143d3bf25e956b1c3cd13582
-
Filesize
6KB
MD5936374a8555b44f39a9de3da2762df2b
SHA1a7eb910929db3547be62d0c854e24e34f7750adf
SHA256e3065becc2e446db0f39874949565fe25eeaa639f15e915044520ea4aaab7c36
SHA5125e733987df800dcf0d584dc4f2c0070ec813a98beba2827f2ea2af57a407ea6a9e45055e7f720780be42a7eb65369eb5a98fa3d0d4fb63f7d524b65c4bcba710
-
Filesize
11KB
MD503498d300a44bd79eb8bcdc3d7560250
SHA180a981fab76c121df02542a76d2b28a5c88548e6
SHA256cd71cd289a03ae80542d4378f707d41aca2c68f904273ef1a9ae3cb2eb3a64cb
SHA5120f1a06422fd2a342aee46b5f46c0ffbec95fd3fa856ece6d27089a6dc2608d1885b1bf14455f1aa1d3b280484d77f542d65c92c398dd5101091322046b2358c1