Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
5fb8fb66610cafb029cd23398d770cd7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5fb8fb66610cafb029cd23398d770cd7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5fb8fb66610cafb029cd23398d770cd7_JaffaCakes118.html
-
Size
51KB
-
MD5
5fb8fb66610cafb029cd23398d770cd7
-
SHA1
4fe23ab8f4986031f5152a90881bc78cf8407ac1
-
SHA256
b40663c708429410298ec943e104b8ec9c6dd94d6ee3ac48139ab9eed31c959d
-
SHA512
c20dbb77f732c44918e713815d518ff1ed6da8eafa5c6c44091e70b90d7deb7c5405bcd28f5bdcd22040dba1ee59e901080f1ac51cb309294bc727d214a551e6
-
SSDEEP
768:S2b4CAGMu6VqKicEnqAOUnGJyZP1IQvdQ4MJrJQ/:S2b4cMnrEn6LRJrq/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1292 msedge.exe 1292 msedge.exe 2972 msedge.exe 2972 msedge.exe 4956 identity_helper.exe 4956 identity_helper.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3904 2972 msedge.exe 84 PID 2972 wrote to memory of 3904 2972 msedge.exe 84 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 3048 2972 msedge.exe 85 PID 2972 wrote to memory of 1292 2972 msedge.exe 86 PID 2972 wrote to memory of 1292 2972 msedge.exe 86 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87 PID 2972 wrote to memory of 3292 2972 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5fb8fb66610cafb029cd23398d770cd7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc82e546f8,0x7ffc82e54708,0x7ffc82e547182⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11746393776905447445,11202154124655725572,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
191B
MD57258fd084fee6d7b1bfd6df150b5916c
SHA1b3bf0597d9616ca03c6c6faf95aa8ba1e9a1503d
SHA25629de3f94aa70509fc19155806c0807cdd399f0aab6df69823580105eb14f5c49
SHA512902b4979b29042c22380efe244c1f10bd885de4fba42c6aa43ee0c197009dc9318c014dc9c6533bf27e71bd5bf2ed60368066b3739bada0781a77d4d12e8ba12
-
Filesize
5KB
MD50e68897c5d2b9d2ff9cb6a8ede62fbab
SHA1d98bc685c2ae3678946300f1e29ec94954bfbe65
SHA256fb20fc3bc25382bd88e36055634bd3b603ee694f5ada873d2d82a892b2adeca4
SHA5125dd962506afc2f2b5f9e40d0f56ef1eb10aed64ecfed34819f1e7f0233decb0f4698fb8de154947a9c158a7d74b74574745defca90bc63840189b09104a5d539
-
Filesize
6KB
MD5cacd57144316debd67a8b88d564129b5
SHA1e2654092f0987e95855c7b557d99d50ceeba0659
SHA25605d162defcb38d16e502aed04670b3488ab292f4a36d4b73d2e792e69054cd12
SHA51245ff7bd33b3ef25ab20a3685c7c074f4fa0b112635d151e055e0ab93914a825ec3ee971385867b829fc4d63b8858af62d9aefe47bee51ca8544bb112f5a1ea4d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b473856840939ce758c1ddb5c656076c
SHA1243b78fb65a7364871ab18e9a98857d700ac9603
SHA256239d64988607e2dd3abc5206c0f2176884d7ba0f3e6c9c0d14e578540454696d
SHA512c24ec19b6a6e4c842ea3d7265c8d4114aa625c23dea658292e0e103eb0028e5fa3e315b93b581fe94d6ac6885ec408583741f641e414ef036dfbc0a1f799228c