Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
5526fd283007a9a7f5679ed7d8b2a1d7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5526fd283007a9a7f5679ed7d8b2a1d7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5526fd283007a9a7f5679ed7d8b2a1d7_JaffaCakes118.html
-
Size
50KB
-
MD5
5526fd283007a9a7f5679ed7d8b2a1d7
-
SHA1
dade9656da0c61a9f3cee0b55a88d6902eea886b
-
SHA256
98e233d30f6581f29932cb296cead01ec5db6b1a87b3d3e2e0aa18adf71bae3d
-
SHA512
3db7c3b55438ec03d53c74e07a387e87deaeb64fb890f44d8baabc6cd8965b85e2a6d4de140c061c7e7e947c936b906e6dddc724e998d292e7a520a243b4ee18
-
SSDEEP
1536:o1DS5cqHp6zxnxkGF04iJJwDIMHpKRvqueegeLfw9DK:0S5cqHp6zxnxUO9DK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 2016 msedge.exe 2016 msedge.exe 2940 identity_helper.exe 2940 identity_helper.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 5088 2016 msedge.exe 84 PID 2016 wrote to memory of 5088 2016 msedge.exe 84 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 2296 2016 msedge.exe 85 PID 2016 wrote to memory of 1556 2016 msedge.exe 86 PID 2016 wrote to memory of 1556 2016 msedge.exe 86 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87 PID 2016 wrote to memory of 1412 2016 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5526fd283007a9a7f5679ed7d8b2a1d7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe649f46f8,0x7ffe649f4708,0x7ffe649f47182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11740161477897011229,3953197336525914235,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
190B
MD5f25804942761ecf9b43bf2294fd25544
SHA1e8f5b633d34653d4d37ce8982a7b0d5a57a683e5
SHA2561c79e94c48d643c11eae3f0d7b73eeede3a2b8b98c55a76d41caaf3a2fd17d18
SHA5126f3c4de6b48d4516dbf7b8c836c9f183de820345d989730c82b9d817bfab488f71c8de19e543b9b5537c39ae3beca3b4fded74c33a1466287e47cc5c2aebcb2a
-
Filesize
5KB
MD5437a6bf2a791e9b86364c672d7f5fa18
SHA14b573f953c2a809ab6623a7ddd65fb316b02c36b
SHA25667fd5775ef68934ca9fc4eb5a786b0ac1e6d9cd2ed1597e35ac5e3cf35d9a56a
SHA5120491bc90feb9d825277a7faa8f7610b6837d59b019d51388a98f566a743c921ce787338f57e310045f01f378d0e7ead6d835fd07794aee3c685c3b90dd4e3c4e
-
Filesize
6KB
MD527ba05eb9bf38558a9c18e627634313e
SHA14dbca22a2760b45b922fb27278afabe9cbb2826c
SHA2569f0af75308a9b289c9525a700e651e99c0b740746f8e8ed83623da376949c9f5
SHA512f232a94f4bec718a4bd9ecd2ed4d1c7b4f8cefb38557024f720db8dc2d7c3fd56081296b0ab360d2d12d4b5f733c8afd3669106afd9ba427696730193e4bc213
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD591d92c83efb0d51d7c571fd892d242ba
SHA12a419181eb5d6ce4d1cc903cc5a2a097327f0871
SHA2560fcd8fae3e8e0713061ca9427cf9fb813636e2c9f96fa90dca841c8b807ff909
SHA512a7d4383f10911075636cc779b321dc9d7af18662ee69b7cd25e95e00f6300632a56dd1c1d65e13563d2b20ccf58a6a4ad9a660d6711d0414f710e8fd53901ae8