Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
5f05cf1cc1d778f821fa9a85fc0b7e7d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f05cf1cc1d778f821fa9a85fc0b7e7d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5f05cf1cc1d778f821fa9a85fc0b7e7d_JaffaCakes118.html
-
Size
121KB
-
MD5
5f05cf1cc1d778f821fa9a85fc0b7e7d
-
SHA1
3320c87001870adf9a9d39339c371e9efd234d69
-
SHA256
35bb3f92b12ef200dfaa34d0a8ff6d91a759e3feca81f812326e2525b03fc5a2
-
SHA512
76088cbbd142e52e69ef74a42be58074fa3a993827c534d70d72a95fadf51ac6751ce3340924c8d9472bdb6a481240519ccc358172a636cdd1901b344cb41b47
-
SSDEEP
768:HhxYU902Xy7xPtDvHN5SU2v590sSl/DGwcwbO4+pps6ocAuvyyFznrdDYrvZ4qF0:BG72XyfDSU2zNwbA5oxuvFprdDYrGtfP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 396 msedge.exe 396 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 404 396 msedge.exe 84 PID 396 wrote to memory of 404 396 msedge.exe 84 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 4400 396 msedge.exe 85 PID 396 wrote to memory of 3976 396 msedge.exe 86 PID 396 wrote to memory of 3976 396 msedge.exe 86 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87 PID 396 wrote to memory of 1396 396 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f05cf1cc1d778f821fa9a85fc0b7e7d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe333646f8,0x7ffe33364708,0x7ffe333647182⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10809953607633016383,18147163559358671991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10809953607633016383,18147163559358671991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10809953607633016383,18147163559358671991,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10809953607633016383,18147163559358671991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10809953607633016383,18147163559358671991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10809953607633016383,18147163559358671991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10809953607633016383,18147163559358671991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10809953607633016383,18147163559358671991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10809953607633016383,18147163559358671991,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
5KB
MD5fad5fe341928b46f93d8abc8e2402133
SHA191741fe26d753ba38b716d2751321610f9987fab
SHA256fce17e455045bd604931b15c97d2514bf6b71244f231047cfdbca625ea68fe54
SHA512254e63b9377deca72e6abadec4d0524707cbcc10879df8f1f27bc486a78e711ed0077f1d0ff8a3ed62a0ec786b752c94d3ce9253b4ef6c5053acd3964d2f06ba
-
Filesize
6KB
MD55cfaf8d6873433910e036ddc69089ee6
SHA10cd32d3c15c211efc66ac1139ad3eb0d2d6a1c4f
SHA25662e895346d0da98723d17f892e818dd7bd9598f82d77b1c51998b0ef20895f2b
SHA51221fb4e3f1b6081119c13db9aae186025d1ccffce2d83cfff219c794b9e1c67b58ba6a51fc0ec24171fbdc8479caf23e15e09828893de184d007af8b0b657a9a7
-
Filesize
10KB
MD59d3a163871e5c64641b86b5171f3624b
SHA1472ca4056d118461134118c23a82eedeaa27622c
SHA25601a453b1d814b7eb3f3b12f095f3cef6ae8d9d0c6560c7fa338349342e9b6493
SHA5125e86cfb1e6900e11f8abe50e6d6109632832b6680b62cf1044c2357f032ec947052263c65ed3009f5b018fd881ca4a3543dc767a442030494268c7943724ad05