Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
5f62344b01e2908b1d5f01aadf4a05c8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f62344b01e2908b1d5f01aadf4a05c8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5f62344b01e2908b1d5f01aadf4a05c8_JaffaCakes118.html
-
Size
53KB
-
MD5
5f62344b01e2908b1d5f01aadf4a05c8
-
SHA1
2fc4b4cca9ec89fa6cfc623a81a4c605818e48bf
-
SHA256
c29ee3123b4e14afa9bda49e7d717ab336207f249fb3ef54421dcda512a05e0e
-
SHA512
92b5b4d2036ced608b5125671f2f13bcb636a160b656bcf54b7ec49f4bbd6f6a8ae8eeebaf8caff895ab7d1ef04b30088eea76d4bca4fa56b899e9e0b2e9b569
-
SSDEEP
1536:CkgUiIakTqGivi+PyUbrunlYlK63Nj+q5VyvR0w2AzTICbbqo42/t9M/dNwIUTDl:CkgUiIakTqGivi+PyUbrunlYlK63Nj+x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 4544 msedge.exe 4544 msedge.exe 1440 identity_helper.exe 1440 identity_helper.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 2184 4544 msedge.exe 84 PID 4544 wrote to memory of 2184 4544 msedge.exe 84 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2684 4544 msedge.exe 85 PID 4544 wrote to memory of 2748 4544 msedge.exe 86 PID 4544 wrote to memory of 2748 4544 msedge.exe 86 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87 PID 4544 wrote to memory of 2400 4544 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f62344b01e2908b1d5f01aadf4a05c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff876c946f8,0x7ff876c94708,0x7ff876c947182⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11741150431109591418,5215200120835521368,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
403B
MD5ba3405a88e5f5de247d9de256956ec07
SHA10e86ec9d95b393ebde6b976768aa4d0883e878cc
SHA256eb68b843976fc2af0f124c6d3a4e95bc772a7f3023ee1cd942b5bfad717808be
SHA512120f4e0c8e0465a4392a1ec653e5c006fb8877a7a251d23c3972fcc68823df4362ed51bd0a2117197092f15aa030efee96628b7f8d8ad0e1479bd0474a8b80fb
-
Filesize
5KB
MD524409c6fc05681f1f22fe1621f24bfb1
SHA18ec19eec1527b45425356b2875faf8a290da7d9d
SHA2566f6071abd72bfcdd36544587ac6a9542281eb588a0dbedf9f56b49836ebb379b
SHA512a3a602c49a4514f71288fea3108ae7faf3486d7e01356e824af9e0911e409dc4c7926e805175825186e8515e8ae3629a4717bac801cfef978da5b94cc51b58c8
-
Filesize
6KB
MD5af4acb517f08bc5c5f8e874f910d98ea
SHA1b72bc240ef35da3bb4e1e6291a2f5b45ae78c87d
SHA2560216d2a5b430bf65513fcf196abd03433f177c1113adafb6a43f63b6cd8d8893
SHA5122650508b3a073a6a4b5e0c5bd65416d2db19893f2f8a3933120e821c33bbc84ac539dc780be3c334567555e4023933930dfef123141587346278205995aa11fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a862277b5b691fe6b266f0e393ba9fab
SHA1ef673c9853690eeb935d110441c08ae162540b62
SHA256f027775faee73008ad4d65d2e5f5fcf8aa2ab35ef3cfa0914f79788fcd71ca86
SHA51217be9cfe2304a8102522261a5bea89c292ac233bc1464e48637cb1b15241b6358dfad70a94c7ae7c1a03437a365f8b734e0bdb7eabb10f290bb45a189936ad95