Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
5a9b0f96f2611d6ef31fced1a11c49a2_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a9b0f96f2611d6ef31fced1a11c49a2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5a9b0f96f2611d6ef31fced1a11c49a2_JaffaCakes118.html
-
Size
104KB
-
MD5
5a9b0f96f2611d6ef31fced1a11c49a2
-
SHA1
8378487289cb676a507ce86c4caa2715cf3f23a4
-
SHA256
4959804b2e98339fcf23542135666caad181b3c464702d8e24f9bf452e1467c8
-
SHA512
9e57bea1f0b60c714065434f770f65fdc656bed722e2d4fc68d2c1adbcc8c672ddf7149879921ad79f43ad5b5a0d55ab5c2f09cdb54b3b2deb0b6c2e771ea589
-
SSDEEP
1536:SISBMzDl2WwEbo7xmMCUzZ2wQzRgkFZWJRigGEFhH2csw:SISObk4MCnTzRrIigGQH2cF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 1428 msedge.exe 1428 msedge.exe 4112 identity_helper.exe 4112 identity_helper.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2000 1428 msedge.exe 84 PID 1428 wrote to memory of 2000 1428 msedge.exe 84 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 656 1428 msedge.exe 85 PID 1428 wrote to memory of 4696 1428 msedge.exe 86 PID 1428 wrote to memory of 4696 1428 msedge.exe 86 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87 PID 1428 wrote to memory of 1972 1428 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5a9b0f96f2611d6ef31fced1a11c49a2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa89d446f8,0x7ffa89d44708,0x7ffa89d447182⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,11029657090522214418,17431358407356916885,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
5KB
MD55639e74e2f2d76989bb924ce81d38bd3
SHA1ed99c54a21d6b1041016609825fd4dfed5c606ee
SHA25673071ee900e85339aba4923809385fd634322ca5efe5085681b4efc4a3b4cb8c
SHA51255be6a2c567b776bde5bad5157d714094f5f61cae387a58835d04426567049d74eb341fd7be404c161b11814cc32baa163d2c308db2420b0fd42774b3b9d5992
-
Filesize
6KB
MD557bd26d5cb299e298285ea8790c02338
SHA16fcb6ef20d6d290382b073b46e1a604f62c18f87
SHA25664bab27f43dabf16c182a6615702d6d56b0fbcea6e904925684b3e3963b5764b
SHA512017e90029cd36ad6707438e0f5a5825924ffdcea816adeff9630a281221bb9592130ab18eec7e150f5aa29034fbfb96faade43ddfd6902ae56b3a8766542dd0a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5de13e43b6a82daf80ffa47701f4d354b
SHA1c5983e22a88a4071391e54fd83e63ad154f2ddf7
SHA256408b2c0235a2e56ee6668aa694e95a0d1d3938a45e646d6300c1494db0175f23
SHA512f404ec4acc4150fbe050426f74ef497151d393ebd45f631fcdd7275adc05d70cedce82f4fcc0dc19890c35e81154db1e20e67af51356813a0398e818b024a6cc