Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
f6541c981ffe241f562f5e4ba101159e_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f6541c981ffe241f562f5e4ba101159e_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f6541c981ffe241f562f5e4ba101159e_JaffaCakes118.html
-
Size
19KB
-
MD5
f6541c981ffe241f562f5e4ba101159e
-
SHA1
b0722ee91e8c903caa86e0120d906a7249fdd326
-
SHA256
e0bb881ba3f5e588b7bb6b67b64a528382f80347d866fe40bcd52ba037b6f5c8
-
SHA512
e0a94ce40ce70d4d4860c73ab526d2873c15969b15780ff5befc9142e42a7aa13ed6ea0a746d519abd7c4bae664c046bf15d72c584511e7c93bcf8aa00a80e9a
-
SSDEEP
192:csz7blAYS/mo0mAoXX4LG5maNWJUDyPcb76f:cQlAY8eoH4LG5m8WJUDjS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 4720 msedge.exe 4720 msedge.exe 424 identity_helper.exe 424 identity_helper.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3196 4720 msedge.exe 83 PID 4720 wrote to memory of 3196 4720 msedge.exe 83 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 4408 4720 msedge.exe 85 PID 4720 wrote to memory of 3928 4720 msedge.exe 86 PID 4720 wrote to memory of 3928 4720 msedge.exe 86 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87 PID 4720 wrote to memory of 2880 4720 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f6541c981ffe241f562f5e4ba101159e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd10046f8,0x7ffdd1004708,0x7ffdd10047182⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5932029919478518657,1238438100506956770,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\20adf5ea-ad2a-46fd-b433-36ef3c05bca5.tmp
Filesize6KB
MD5696c466fe1a88e7926f48bfcacf18ef4
SHA1bcea01cddcaf6fd0ae332b5e01800d3a632bb950
SHA2567448e18c5356887e3cf7bcb046226e13ae55d4df93b18bfed9a6c032fa091c24
SHA512b697c985cb000190be08e4a2983eaf1f82af95b6b3c85467e169dc8138f1353254726128cab24fb80b36aa2cd29593979718c801257fae534afa436e4aa31a25
-
Filesize
6KB
MD56d74037ab5c80482c8202e707903c75e
SHA1f4773c814a0b2ea55000a800306b25b63c9f17bd
SHA2568c3120790139a26af9c9e87886dabb3253d4a54bf64310a4dfcb4c5bb448a8b9
SHA5128fcfe06f3e616ca188b66fe0c847014bd4d4d2d4a90567cbeac1c1ebb7c8c74ee29d81f9c8eae47f34c750d11911395be60ea5c38208e00eb617bec0c6d3b4cd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD559b806e8552a85f74d2a0c24452c625a
SHA13841d564b705d6efa46f1162feccd372f159fe7c
SHA25602094b82a4dabd858f41ddcdaa8222c2a8f0942bbc0e04ce31cbf0aba8e1c289
SHA512224c102a43104c033cc5a9de6527029c27b43758391aebc3396a4bd268287a1ff36f12575aa017b80944fe40aaa524a1e2227cbdc2bc05c1c632a0cb8c10ee86