Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 08:48
Static task
static1
Behavioral task
behavioral1
Sample
5b3a8b44933b8fa2ff948f22449f2c00_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5b3a8b44933b8fa2ff948f22449f2c00_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5b3a8b44933b8fa2ff948f22449f2c00_JaffaCakes118.html
-
Size
19KB
-
MD5
5b3a8b44933b8fa2ff948f22449f2c00
-
SHA1
b4a27c0e5c0ffe2e742653dd2ef378286bdaf42b
-
SHA256
528b9ceababc3ebb4b9fe3a0efc10704fe4d0f98e6d040b9d079cb571276329c
-
SHA512
2938c2618475890897fa7ba159e1d79ef2d7785f5e34c5df7c6e426eaff75fc64a6e66f47f31ba653c2812ebe574e4a40e61812af7197bf53fb2890fba3fdfc0
-
SSDEEP
192:uw/ob5nh2HfnQjxn5Q/VnQieQNn6bnQOkEntv/nQTbnJnQmSgHMBwqnYnQ5VNnlI:IQ/g4q9L4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 676 msedge.exe 676 msedge.exe 2500 msedge.exe 2500 msedge.exe 748 identity_helper.exe 748 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 3408 2500 msedge.exe 84 PID 2500 wrote to memory of 3408 2500 msedge.exe 84 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 1552 2500 msedge.exe 85 PID 2500 wrote to memory of 676 2500 msedge.exe 86 PID 2500 wrote to memory of 676 2500 msedge.exe 86 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87 PID 2500 wrote to memory of 860 2500 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5b3a8b44933b8fa2ff948f22449f2c00_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97c5c46f8,0x7ff97c5c4708,0x7ff97c5c47182⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2933518049344785172,8347708043573823465,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
5KB
MD5969df31bb3070ab3c5d4fccafaba1833
SHA1e0b7c0856a56a8d2871fe44fa0c80fd6915bf4ce
SHA256bc528ea615551b1d5bb855dceb0768d3c3e1d633ef961ae38f03bba96f188e72
SHA512d59e208053f6db1f8f4baa0b9b64794854af631d25c81437ea3d11c011f2b2ced9be4484c3ccb0e473d00315ca7050d6d3038ca0b33aaccd2e94f162a2d4cd22
-
Filesize
6KB
MD558f4e3ca7fa5c10aeeb4d02380f4e6ee
SHA17d48f6a5ff5f28d73dc03bf7d805cdddf45ee651
SHA256262fc11fc7aa4310c11b9b053af56ba2c1bf29183e04de60cb8e0a0c5deac385
SHA512f76ac637ae2962ba68e070648a640f850d8174cf52eb1807d6d55772e31f849eacac6ee8f7b0f409a79a25b1467a09401905ce0ad4dcc45192400d9adb37fb6b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ccf1c3804d45907ba77de672fff17484
SHA1199cf04e6547f9b29b6c1c780acf72b884de1f00
SHA2568da75f299893ea143a6ab6e1d7ac2a4cad4afb827002c55a255596d682b2ce7a
SHA512b5fff972e99460d59c11ae191f6d35a096543cde0979331f6ad607f31c30aa02ea045f13753127490ac1b06a3c14340bef58fcdb445467a846f2c0956bc75345