Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
5f1883e0aab010403607e08a8537e135_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f1883e0aab010403607e08a8537e135_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5f1883e0aab010403607e08a8537e135_JaffaCakes118.html
-
Size
32KB
-
MD5
5f1883e0aab010403607e08a8537e135
-
SHA1
a7e3698dfeb0abf2f88e2f219d7897ebd91b5b81
-
SHA256
60daace317c19fca79c2c33de389f6505150081cab0c696093fb865c3a96a598
-
SHA512
08bf4f5f0845caa297e1e61cd17b77818a8a8fa9c2f34134589c7dc2aa5a1e153790a5c68d05edf6805ef6a85e48c9f3a813e6ca8af5e99c0b6c38bbe01972fa
-
SSDEEP
192:VWCk3GDG7GSFGNGeWqGUpGtqhyvdb5nYz6CnQjxn5Q/SnQie5Nn/nQOkEntOMnQU:ACk3GDG7GaGNG9qG8Gt/Q/JWSAEQ/jS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 1680 msedge.exe 1680 msedge.exe 3308 identity_helper.exe 3308 identity_helper.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2516 1680 msedge.exe 84 PID 1680 wrote to memory of 2516 1680 msedge.exe 84 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 2720 1680 msedge.exe 85 PID 1680 wrote to memory of 4932 1680 msedge.exe 86 PID 1680 wrote to memory of 4932 1680 msedge.exe 86 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87 PID 1680 wrote to memory of 2660 1680 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f1883e0aab010403607e08a8537e135_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce37046f8,0x7ffce3704708,0x7ffce37047182⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1328 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2560 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1444886521072887772,11448330316277699620,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\740bf80e-34ef-46b8-8dfa-32799f3d721f.tmp
Filesize5KB
MD51d0969fe77a61ef946fc4bd906f2d8b4
SHA114d5bc2a796dff6320df397cbeb80192dc2ee04b
SHA2560fc80649e0e94f2a8033a0f36aa4daec1a580060441b6f958356ce0b17a02315
SHA512f72f0b291556e49e9a2d831616ee0f601e69ee199e49cf521b03f127c36d3d5ed96a879cf52a9ff4103480de84eb6e4365717edc79faf7da1919be4193791455
-
Filesize
6KB
MD59325f4b64ee86b0a701dc36ec38a7de8
SHA10b37c3612158f296c38dd91206e7c1a69f37f12e
SHA256d3b2a2b0d32e23eb57af31b2b8b04791ac31bb25801f5f8f4932ef387c640b5b
SHA5125f4e0d128cfe1512704d1b564fdc78c644345383b9f95afe4b71e105a05aed03b4ffbeb03efa7c94c2e122516905812baafd6eed6388ffa0b5d01357ec00144d
-
Filesize
6KB
MD5913bf5bb38b7dd3ccb70b29168b67bb1
SHA128355908a176cf72ab0b5023d64d10c925e450e8
SHA2561dc20379f9d85f686eb7d2a3a363a7f63f5ffad39442f55899077b0befac39d8
SHA512bc615730c8aad6406a4849042cbaa1788ac77c63c792c00f0f94ffd628f4d1276a080464b125bffddcf9b6c31f314677e9a264ca19771de4759aa92ec07e6a64
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d21ed12c2cfcffb1237194e0f30bbde1
SHA1f7604cf7ab54ac93ed2786f81018361cbf9cb622
SHA2560b7e7459b468bdc35538fb747a5d31fefac4bac231cfa1b32e9a512c736fdece
SHA5120cc25dbcd9352fe9ec84a7609ea6e9c4bc66788891e46f089f1c05e8db5cd7e99dff149f4bda97715e737f85db58a9007f82be2e589c5e2d175248b76a7733bb