Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
5df7947ce716cbd2aed40bbde58ac6c8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5df7947ce716cbd2aed40bbde58ac6c8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5df7947ce716cbd2aed40bbde58ac6c8_JaffaCakes118.html
-
Size
7KB
-
MD5
5df7947ce716cbd2aed40bbde58ac6c8
-
SHA1
d0bafbedf0f961a102c881a1c2157357e8b09219
-
SHA256
d2c43912a7ac4b5222cb1350825d856e850bf95d2e5ad8f46d1f5fa7fefe240a
-
SHA512
0e9026ee4a92c07890b48c8a852a90ee2e0bd067e60537725c19b7aa42350feea497029257c0dee92e2c4f88c7d7416d236029068dbb13a70344265d56dda8dd
-
SSDEEP
96:uzVs+ux7E4LLY1k9o84d12ef7CSTUTzf0b9qQ/s6fcEZ7ru7f:csz7E4AYS/ltb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 1412 msedge.exe 1412 msedge.exe 4432 identity_helper.exe 4432 identity_helper.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1776 1412 msedge.exe 84 PID 1412 wrote to memory of 1776 1412 msedge.exe 84 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 4232 1412 msedge.exe 85 PID 1412 wrote to memory of 5092 1412 msedge.exe 86 PID 1412 wrote to memory of 5092 1412 msedge.exe 86 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87 PID 1412 wrote to memory of 1052 1412 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5df7947ce716cbd2aed40bbde58ac6c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb261046f8,0x7ffb26104708,0x7ffb261047182⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,5706041746649508296,17528593476125248582,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
5KB
MD5666a7b112a51bb130c8872ddf3d50898
SHA1363d089436d48a503a9c1379a598ba4ddf2d82eb
SHA25643f09198fb01b61098ece24019122f8956df76a5ccb91f71ae75e795d4814f87
SHA512bd63825a25e32ef341451853fad127b5d0e3e10121ce5762641f61c5a320c19774d09da941ec20d044aaf132382b0b597b59d4c514d9ad8ebada41c7b28589e5
-
Filesize
6KB
MD59c9c4bf0919db04d9b8a17b1fb55fc3a
SHA13daeb1859e74035446b5708546a6d03e3640385a
SHA2560f9f790645a6b5cb7b1a4dfcbbd3bf4a241ed8a96a03c8ea47dc8928539211c5
SHA512e1352cb3e805cf251c3564bdc3406b7a2aa64f7305dcebb695a4e0ec3c242831672030fadf3ecb77a10a69ee981e68c3a0507342f14876f48389a29e3e8f960d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f6dc4f7eb29f49193500f8c7a63a7436
SHA14fda1976d20ea59e2e2bc6457e53067f9cdc11c2
SHA256073b6dd820bcfe95876151b1151f27e1988b6d43579914bc7ebec68331d29106
SHA512a9c960c5fbf6f18084c41f096b96b2240d5196d0c20a1678ee28541f43e935f1d59014864c8bc98b84477194e49f6e991ac34b4f79229d2aecd4a511274d4696