Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
6119fd6f19e305ba56cbf567c66a462e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6119fd6f19e305ba56cbf567c66a462e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6119fd6f19e305ba56cbf567c66a462e_JaffaCakes118.html
-
Size
213KB
-
MD5
6119fd6f19e305ba56cbf567c66a462e
-
SHA1
808c8208d3dfa9a06b404ebd98693d5ef7671a0a
-
SHA256
a623bdf74db44a033cef53c508bb14ec44df42f35d3f55fa53d4f099fae0d1af
-
SHA512
018c582dc0efc23b352e4a37b9d1dafa1360e222c72cbf1e43c9a3160296c6824bd7d7fd747f86de8f76370c90b1d4348d8140e1b242bf6b4a162d3380c74b7d
-
SSDEEP
3072:SEZIhZwrXeF7MY/yfkMY+BES09JXAnyrZalI+YQ:SWv6KsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 1684 msedge.exe 1684 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 3260 1684 msedge.exe 83 PID 1684 wrote to memory of 3260 1684 msedge.exe 83 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4844 1684 msedge.exe 84 PID 1684 wrote to memory of 4680 1684 msedge.exe 85 PID 1684 wrote to memory of 4680 1684 msedge.exe 85 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86 PID 1684 wrote to memory of 4432 1684 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6119fd6f19e305ba56cbf567c66a462e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9eb546f8,0x7ffd9eb54708,0x7ffd9eb547182⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,6497983982769084569,2888193877630876358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,6497983982769084569,2888193877630876358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,6497983982769084569,2888193877630876358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,6497983982769084569,2888193877630876358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,6497983982769084569,2888193877630876358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,6497983982769084569,2888193877630876358,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD5b477babb79053182e5650bc322f259e5
SHA197223a7a5030f4890e7698095e6102d2add2e118
SHA256e546cc68a7afebe3ea91e8507ffae181908aff964faf0670e0c6a04697a20483
SHA5122210e68c5a944247523f7bbb0e6b1f22f47f058e7ae7689bf1e3c8cf99f9251c99605fb7b8783b8f2858f5252ca6e8331de209da3c13958a148883527b508f68
-
Filesize
6KB
MD5b643bd55ab527517f2008f16d19a0120
SHA1315e3c7587520d547c3e197408460f4590138681
SHA256b576d3a6314963f09a97763a3d85514207e31d9fb8c5c265741bae6c17572b34
SHA5120bd2ade99b6ea3680f42b5bba160c6b28f727cf9cf1b854a6d8b59302198af16b3183a3f7a24f88ab1edeb838ed1ed195e684990d5113fef793cc02e8843d984
-
Filesize
11KB
MD544e68556d271f3f02ebff534bc8341e3
SHA1ac89cd600348fa426b7c0cdbe2ba9f992f9765bb
SHA256ee2688686ea16da976203761b6ab1a578280e1595d4e75c75ba08912bbaf2861
SHA5125c4026b42dc8174c3ef89ff2853b2350da479e5d6876827460ab3ce95b8c3aec0968e266a693ef4fa2e9b7d425cce8f09aa1be758d0206cffb166b25a9bbe2f7