Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
06e78a944c08dd38330143b920630f22_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06e78a944c08dd38330143b920630f22_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
06e78a944c08dd38330143b920630f22_JaffaCakes118.html
-
Size
63KB
-
MD5
06e78a944c08dd38330143b920630f22
-
SHA1
3c2663ef3df204d19f6d4833a6913e69f9b4b7d0
-
SHA256
092d14724219a6864592b27d1346f40c34b666ff460761d803add33ba53504bc
-
SHA512
5f15d5bca967bf960c5b32bdf92a9dc823803599633022f9063ea57773725ed21b96514030f272f55b8a3b3e5415c1818198cf6b4d988d9fbceda286668312f5
-
SSDEEP
1536:Ka8LJyTdxwTBS4T4xkGYn6QEdisW/MrXm0d/K26BLBsiW:Ka8FynwTBS4T4DYn6QEdisW/YXm0pK2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 4468 msedge.exe 4468 msedge.exe 1964 identity_helper.exe 1964 identity_helper.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2932 4468 msedge.exe 84 PID 4468 wrote to memory of 2932 4468 msedge.exe 84 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2912 4468 msedge.exe 85 PID 4468 wrote to memory of 2948 4468 msedge.exe 86 PID 4468 wrote to memory of 2948 4468 msedge.exe 86 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87 PID 4468 wrote to memory of 1924 4468 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\06e78a944c08dd38330143b920630f22_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa184e46f8,0x7ffa184e4708,0x7ffa184e47182⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2868 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,12658294120868571305,1689822643866498729,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD549099d67976c43bad33cb7a47bdf7d4d
SHA128217e43cab700c6c4d6cd963643ecb7d72601f1
SHA256d18b67ccce7c0286c81e6fd4552664a4891a12b626dd28bbc0db5aad52a01c5f
SHA512a56c83d634e405fbdbe25740ae90b63b61ceee347c3ade3d8e01155d41db611558f776edda65ed3341cab48756af8b74087fb3456654b97ab12bf24a270f621a
-
Filesize
6KB
MD50e8215472f850cbce0ca96c1578d0525
SHA16223a1e7756052be0d97f16411976c235285de14
SHA256cc1df823c240b9758557d65e2904c9505edc274931fb1b2bd10667ea40e8d5ec
SHA512af4a53dd79f056649cdb13292865d0c984936ce39dc9328b11b178e1905643f14a484343ef6ac0ca5d2076883ff2b84ef34d1be083700ea24b85ab8afd9e1919
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5eb52d26017e755450936af90c592830f
SHA16bcd26757cd35c79cc8190cd2dbf120be69fc220
SHA25650ca4500a711bef350b8e115ac9ad5ab850eca5381923ed9cc8d8d7bb919701b
SHA5122a02bb189ea5387750fa49b5a8c7459259d90ed6656ee9c93a1e9a88ffc718dd6bac6a3db9ddd9e47845d7308dfa5ec170e6594a326dd5872e41e6464720da9a