Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
f5c565c88ffccc217310d04d9897de2f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5c565c88ffccc217310d04d9897de2f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5c565c88ffccc217310d04d9897de2f_JaffaCakes118.html
-
Size
461KB
-
MD5
f5c565c88ffccc217310d04d9897de2f
-
SHA1
66529e1e72b4cb551c70779c00279fca25b6bf41
-
SHA256
382f27bc1b55527edfd0151f6ace0cdc26341a84ff8ea02aa4019c5d7155bf24
-
SHA512
94d52ccbd29d4759ce261dde10ca949ecee656ba5be535f32b151559dd2ffbc4b80be2c140086b414f42dfa55a924f20f5a38e392fb760ab0b07b521493e8713
-
SSDEEP
6144:SnsMYod+X3oI+YOQIsMYod+X3oI+YI7sMYod+X3oI+YLsMYod+X3oI+YQ:q5d+X365d+X3+5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 3568 msedge.exe 3568 msedge.exe 3332 identity_helper.exe 3332 identity_helper.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3568 wrote to memory of 3612 3568 msedge.exe 82 PID 3568 wrote to memory of 3612 3568 msedge.exe 82 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 4468 3568 msedge.exe 83 PID 3568 wrote to memory of 1456 3568 msedge.exe 84 PID 3568 wrote to memory of 1456 3568 msedge.exe 84 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85 PID 3568 wrote to memory of 4124 3568 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f5c565c88ffccc217310d04d9897de2f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda94d46f8,0x7ffda94d4708,0x7ffda94d47182⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,3455044608605718489,7545476165615597840,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD55a1bfb566c72e539facc9d73a91d9abc
SHA1b32694b259acc5dfb1a22a5ebc728c7aeedf312d
SHA2567335b85cdadd8ed4ffacfcd2be044b393026c8c1b460a0879e0a7a9b6006f20d
SHA512730964ef485a3e606128d20856167a32322d138f6db78e8d81ecfdafb4a486f10a8aaf8da4c1c9e46c9003d44150a608ba14fa4dd8ba36eb913e9e7f3d84e924
-
Filesize
6KB
MD51abd5c5e063776fc9ece5cf0bf707e83
SHA112150394fddfa55980730fd383b143bccf471607
SHA2564db2d500203651c844b21d2799eeab6ad20eca62e7f6e005095b87c868095f61
SHA512605e323d2db75ad224b6e848b6c296ad9c9b4024614b0dc21fed2495ebc003da2ae5b9944a52283dab5466658488f8991939e7d010c6ab2b2c7d3c6072438d29
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d1b4a634377134639be2e5d35a0c81d1
SHA145fdcd289e4ddc3ebde5f467eabd2e38b86106fc
SHA25690dcb3c6b13f61fa6ec68a13ac19bc44b9035c6f62676a69222472e7b9cbf114
SHA5120b3d1a0af627339b70c86507ffd0fab48b849319bee5c8babd6c24da4cd801fa5c38eb24caa915fe51d67819e42e3b748bf5f07c3fb7d255d7540e96d604e255