Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
5f9e731cf398429380f8a54d5d97f1e6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f9e731cf398429380f8a54d5d97f1e6_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
5f9e731cf398429380f8a54d5d97f1e6_JaffaCakes118.html
-
Size
153KB
-
MD5
5f9e731cf398429380f8a54d5d97f1e6
-
SHA1
7aa5eae7883120fb49527f96e57ed10227729c7c
-
SHA256
4ce0852122d00410f4de8a683e79b64e1abcbe94482bae8cc259ff32bc12d2f1
-
SHA512
bd7d4d65361ecff4c78593773df77799ea601eb23ab613d0e0e8a011e97172b7bc05c1b261ccd842403e1406d11b5d8e30cc179dec170fa5124eddd2dfa7a295
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fck4qHAP6pL8AmhgcZ7SGQ+p:sly6Ligm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 4180 msedge.exe 4180 msedge.exe 376 msedge.exe 376 msedge.exe 376 msedge.exe 376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 840 4180 msedge.exe 83 PID 4180 wrote to memory of 840 4180 msedge.exe 83 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 4832 4180 msedge.exe 84 PID 4180 wrote to memory of 3912 4180 msedge.exe 85 PID 4180 wrote to memory of 3912 4180 msedge.exe 85 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86 PID 4180 wrote to memory of 4164 4180 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f9e731cf398429380f8a54d5d97f1e6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe8,0x108,0x7ffb11d046f8,0x7ffb11d04708,0x7ffb11d047182⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,16015059502530546585,12442907135839380995,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,16015059502530546585,12442907135839380995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,16015059502530546585,12442907135839380995,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,16015059502530546585,12442907135839380995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,16015059502530546585,12442907135839380995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,16015059502530546585,12442907135839380995,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
Filesize
5KB
MD51d9ad399a842b7029ff51acf3e3f1562
SHA1e6b3329512f6f4082d44914480d1deb3df89b63f
SHA25645c593fbbcccd85ee4d37244803151d3f49d49c89f351e410367f5ca299fcdd1
SHA512e90e9aed0ce899d30bb1552b4b2d028d26336ade4f86963e6330153746614f680a73faf10470e53800ac49854472a8ead1eb3e72eafc2d637a0fec2acdd864c1
-
Filesize
6KB
MD5c6b67cc1e44f03e400c34df0b5b12706
SHA1aa069bfbdb504115724801c3a9a6b88ef9485ed2
SHA256573ecd8d0ba0fd5d1e92e1c98d6af1658afb53c37d7f9737d075896d608ba223
SHA512a5cc5f12e59f284eed1aeeae66038898418d626fb5fac128708c478d84429785670d0971b6dbfa6870e7fd40321b9797ca0bc5963c7d6c270cf2b5737730e1fe
-
Filesize
10KB
MD56ef00723cf52f860f5b321de856f3df4
SHA148db11526244b372d6615390181dac5f94317e0e
SHA2563a89d9c2e9b37eb0894baada4103dde59fa782c753a475fa20162703815f45f7
SHA51294b96c5f1362a12590e76588feabc63370b7055c51be4bb629f981461fa60354a1d8c8df9ca982be4b91c1e2fa8c60e2ab6481008ccb66978a4a4396b6532377