Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
5eb1b3524f5404e2c10cfd6cc7f07aa0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5eb1b3524f5404e2c10cfd6cc7f07aa0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5eb1b3524f5404e2c10cfd6cc7f07aa0_JaffaCakes118.html
-
Size
122KB
-
MD5
5eb1b3524f5404e2c10cfd6cc7f07aa0
-
SHA1
4e8b32e1a365a345fc8eb597876caaaab109b5b0
-
SHA256
58fa9db782b0e6f309ff5fbc25db8a75ae931fd54951d28099d2db9720da82c7
-
SHA512
78744d4237ed11e798582d57c17a07c9e9d397de08d7b3d0512ecb063ca1e6831ef82a5e5339731d19445ec832d83bde17e20fc125d52d39e8dcbed1c116d711
-
SSDEEP
1536:I8E0+S1nj8S3J3hQUJCEJrh5MR5+yP4MSTTw:Z+0jN3c4CEJrLRi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 4616 msedge.exe 4616 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 5056 4616 msedge.exe 84 PID 4616 wrote to memory of 5056 4616 msedge.exe 84 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 3140 4616 msedge.exe 85 PID 4616 wrote to memory of 2532 4616 msedge.exe 86 PID 4616 wrote to memory of 2532 4616 msedge.exe 86 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87 PID 4616 wrote to memory of 640 4616 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5eb1b3524f5404e2c10cfd6cc7f07aa0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa52e346f8,0x7ffa52e34708,0x7ffa52e347182⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14956649915918114152,13494454802374232591,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14956649915918114152,13494454802374232591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14956649915918114152,13494454802374232591,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14956649915918114152,13494454802374232591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14956649915918114152,13494454802374232591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14956649915918114152,13494454802374232591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14956649915918114152,13494454802374232591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14956649915918114152,13494454802374232591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14956649915918114152,13494454802374232591,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
5KB
MD5add830e5086ccdfed37e885248cd41d9
SHA16d2b0a1105152fa599efd8920dbdae18233a9c1e
SHA256ebc06a0a072b9153a507b926d886d4ca599d1e919156d12970ae2a0b201c144b
SHA5127c1ea42fcba807fa8cf4db6fe909a7d550a7f299ac2db2a535aa21d2505c81d7769a664eac2a05dfde26aadc16c51f189244bec38e9dd8608cd52e8c11a564bd
-
Filesize
6KB
MD584f130c589e3849c91e74f1e5989d3ab
SHA1ce0c83ab0a118ef97274dee9529e94a99910074d
SHA25609f73d5440a716e54d4848a7660388e9cb10a8038acd46f50cd676ae622f9b5b
SHA512ed6b3d2da6813cff262c770f3a6979c4efea233c5d2fe1102018dc01dd355c6bdbc9692caf97057c1964c218ff2a6fa47075aa811d8af97ba841bc76c29f7dd5
-
Filesize
10KB
MD5efc99b2e15450a0d98c237330f65fa08
SHA1c410fc4e0a7ebf0531e3a7ac174da52e807ba11d
SHA256f2c2cdd4d1439d837f6a53950ff7aaec2235effa16dce2ec1bf0216d818c3394
SHA512069124be1404fdba09f7762a28dfbdcad6a942209eb6c50cc00d7ba21ad4b5376eb4efc6957e1fdc68b0a4c135b5db0364e8718bd2ad62d39ea5024f9740b63f