Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
5e4768d84647fa60bd0d3c4137b98cdd_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e4768d84647fa60bd0d3c4137b98cdd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e4768d84647fa60bd0d3c4137b98cdd_JaffaCakes118.html
-
Size
99B
-
MD5
5e4768d84647fa60bd0d3c4137b98cdd
-
SHA1
4dc40729143ed76e0ec6b8a505ccc4017802dbc8
-
SHA256
f67bf47711a7f8b97c458305267d3b688bdd6c173b044e64ce84a900cd8ee24c
-
SHA512
eeb3f150ff0452ab91159d580725ac51740b95d2df08a53f8376cc61436acd75980d17a6e1ecde5d8f2c6f90957bf6a9a04f8973b00a3e7390a34c364fab1b4b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 3212 msedge.exe 3212 msedge.exe 2600 identity_helper.exe 2600 identity_helper.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3212 wrote to memory of 2400 3212 msedge.exe 84 PID 3212 wrote to memory of 2400 3212 msedge.exe 84 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 4304 3212 msedge.exe 85 PID 3212 wrote to memory of 3928 3212 msedge.exe 86 PID 3212 wrote to memory of 3928 3212 msedge.exe 86 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87 PID 3212 wrote to memory of 4520 3212 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e4768d84647fa60bd0d3c4137b98cdd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdccaf46f8,0x7ffdccaf4708,0x7ffdccaf47182⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2144 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9347086154606915289,5690153570624435676,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
5KB
MD502b522e104d25c5b96084d86a5d806c8
SHA12337b9b1e984f537f846108e684c5065263507b1
SHA256a6eac1ed2c9c6321cb31233a9383701a1ac2ea54ea9f152828541a5dd64d79a7
SHA51286f469b64c9e89171840197fca583b8ff258770d57c73570741dc9d9d67b41c6ea0c8470eca809e6a7903a2110f53db889c293c01a48958fe059e2f61a5e0678
-
Filesize
6KB
MD526fcaf063ee0ab7dd98d6be0bcfcb441
SHA1294fee2b452a12a7e22fc49e944bb728771d28e2
SHA256be28c6c597ab1b1a58c1d5978d60fe3493133f84404a449adcccf60a94755764
SHA512f97c8de0c784c47ebcdfdc067fbda600d0e20d6ca6b234bffce534c8d5c6c74493b0ded079f4083261f51188f2bdd52a83da9de7d62f25c0f67a5336ed1a30cb
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD512bace92b3af420c9b0b08d150bd81d2
SHA1b3e0377fed39a7b44dfc24b92db61e31454325f9
SHA256c18bacab375f3c3879999a1b136c06e9d9cd22255b0308fa870be2b5eb5ea81f
SHA512d775da7db0a4790851a29362c93b19f1510d1d871e8a1d519a6252ba9848ae867b822fd643052a0b48aac871a0ca926510925d6ee604f684bc86de1ca5545468