Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
5f950d8dffe8ab39b5dfaa1fe49ef219_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f950d8dffe8ab39b5dfaa1fe49ef219_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5f950d8dffe8ab39b5dfaa1fe49ef219_JaffaCakes118.html
-
Size
121KB
-
MD5
5f950d8dffe8ab39b5dfaa1fe49ef219
-
SHA1
de02e6aa309b36ffd70578a6c4f59ebdaa8914a6
-
SHA256
5f37b68c3db5e5ee74f82d297423bf4cedcf590bf441d2c0536fe1fcc558fe98
-
SHA512
24915e8672d8ee145cef62884fd01dd0f6e9ef2ac3864e370e6be3fe033804bf7c8ee24c5faec220453db15e45f71a13b3a5a50c3be376541060e31ac8c3e0ff
-
SSDEEP
1536:omnpxQea7ZYiWuq4G15WYWHlyFKr/AXrmHim:nQea7ZYiWi25WYolyd3m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 4640 msedge.exe 4640 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4640 wrote to memory of 2968 4640 msedge.exe 84 PID 4640 wrote to memory of 2968 4640 msedge.exe 84 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1768 4640 msedge.exe 85 PID 4640 wrote to memory of 1856 4640 msedge.exe 86 PID 4640 wrote to memory of 1856 4640 msedge.exe 86 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87 PID 4640 wrote to memory of 2004 4640 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f950d8dffe8ab39b5dfaa1fe49ef219_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa515b46f8,0x7ffa515b4708,0x7ffa515b47182⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,7633876110191830760,11504958201298581542,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,7633876110191830760,11504958201298581542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,7633876110191830760,11504958201298581542,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7633876110191830760,11504958201298581542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7633876110191830760,11504958201298581542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7633876110191830760,11504958201298581542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7633876110191830760,11504958201298581542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7633876110191830760,11504958201298581542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,7633876110191830760,11504958201298581542,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD504b60a51907d399f3685e03094b603cb
SHA1228d18888782f4e66ca207c1a073560e0a4cc6e7
SHA25687a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3
SHA5122a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91
-
Filesize
152B
MD59622e603d436ca747f3a4407a6ca952e
SHA1297d9aed5337a8a7290ea436b61458c372b1d497
SHA256ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261
SHA512f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5e6dedb3ddb8261283368c2a78988a8ac
SHA1e01ffd138546c24488d68f47fbfe0a651263a994
SHA256959a88981769bfc7461d5766c58ecbaae83018606b0792458ca07e859f5a1898
SHA5125bad0bbffb6ec0e879ec9d3eecf1c01835783f47f832875b1f2e0d5760b876dcc3db5dbb51263390ac6c57f2c02b3cfe24af067c1e05e30aead3b3982b9d9a07
-
Filesize
6KB
MD57d124c8186904eae7cc0d004a997b098
SHA1609919949db31c11301f7e7c5c3c3f7533f036b2
SHA256c228efaa056882435d1df9a40cfd5d47d1fba9f40067270cfa59512add7427eb
SHA512a51acb3f5b10afec9e57007e32b30a0aee5cfb3448e6dd854dcc7b13eccd0eb26142fce15402b5ea2a1e67ca110e0abf3876b86364b5a9767aab09adb9aefabd
-
Filesize
10KB
MD50c20438e2d2d0a0a7ebc6bb3fcb11445
SHA17f71fc5e45acf51db13948d39893fa437a809143
SHA25680bbed6a07e6c6a3e4366eb536c23c73663e66239144c937c885f91e3119a527
SHA5123e65ec59d2da968102aaccf3d0ede3d37a3a6017f1bada660e6aebb071a21d5024c30c9834633a9fa0ec9950813a197b14a7265fb4a9a8f5b012849440a88a1a