Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
5be6b124cb04f324971bd4625d0fedb0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5be6b124cb04f324971bd4625d0fedb0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5be6b124cb04f324971bd4625d0fedb0_JaffaCakes118.html
-
Size
22KB
-
MD5
5be6b124cb04f324971bd4625d0fedb0
-
SHA1
4744220f570fa6500d1fee1d6b0d9742174e0603
-
SHA256
b6f14ed684fe81aa4507f43a4130c61abae63b3eb6ad4f7e7f390e28a98c147b
-
SHA512
7200258fa9c34f4860fee8346accc2cd641269982c4cb09c15d60cd30bc8e08746edd355f41cc439ea2c7c83cc7df647964d640e9d537927e2fa79d2d1606a90
-
SSDEEP
384:FzQ8ppz95CIUClyZ6aHUJvwbHtf9Lach2NyJv8nWzbINCwELpWKEpqr/i1tv+z3i:NQ8nz95vUClg6aHUJvaHtfQcUNyJv2Wy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 3488 identity_helper.exe 3488 identity_helper.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4416 2268 msedge.exe 84 PID 2268 wrote to memory of 4416 2268 msedge.exe 84 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1124 2268 msedge.exe 85 PID 2268 wrote to memory of 1652 2268 msedge.exe 86 PID 2268 wrote to memory of 1652 2268 msedge.exe 86 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87 PID 2268 wrote to memory of 3048 2268 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5be6b124cb04f324971bd4625d0fedb0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0fae46f8,0x7fff0fae4708,0x7fff0fae47182⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2708 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1476 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,8446240256800517096,8656692433388795715,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
5KB
MD509e885fe60fab57ec7123dca75b91e93
SHA194acb17bfe5eba5129e2bcc010c6d12d61e4af86
SHA2567ca74d71247384d4412f676ac4537f7c82a8a59e119a0cbd43f1bf992dee72c8
SHA5128abbc009e4a6e1dd071a41ac28e04dd66871ea08f46474b80d3a15e9fa6d3241442184c0ffb7b0037e7e6d0161449adebb30c04e0c05e007a6740f621c622a04
-
Filesize
6KB
MD57bf6fd93928cb62f1c0932691042384c
SHA18449c8016895d9d12b89d58e2c28e0b550d8f78b
SHA2568c37e66d5c4df61be9cd0abc201fbc38ac458e4ea433cf41493af3bf6b6661a9
SHA512e043a0d6918d0e6597fce253dc1c1933c5ec2119f1a7c9e05f04b79a67e6575fd7fdd2fa92daaf4b496810900c811c05d98b8a7d8198a294a32f1b5fec7b9ed1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ad7071373b722139d0d93f7950e4f609
SHA1259c9201f4a870ebb73d24503a3fb71c94224c5f
SHA256b9b8a7e3229fba2590fe439a6713d5ca43719e52819c7f97428f800d25e8dd0e
SHA5124077692ddb37eb785e22545ad94f84cfd8f875ef5bc820f39bca21af455c5bdf38ecc202b49154ecef45860422ace6b5ddee013f25c102283f8ab0f0d5084b1a