Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
606665a075ec52ebd745ced75daf67e9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
606665a075ec52ebd745ced75daf67e9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
606665a075ec52ebd745ced75daf67e9_JaffaCakes118.html
-
Size
461KB
-
MD5
606665a075ec52ebd745ced75daf67e9
-
SHA1
17f66e2364e37c1a32087dc78b9dfb0ab5571eb1
-
SHA256
4ecbee5c6e3f88dcdcb1b3ccf41eda2ecba0945d03c94bab8f95d9cf91a11e0a
-
SHA512
8d54e48f4a8a97b53d6981a48c4518b1505fe8df477a97bbeb117c77e1e9bcf09698134e2621656150aa038ea1b658db06b6a1344e97ae0536b67609e6557a49
-
SSDEEP
6144:SUsMYod+X3oI+YDsMYod+X3oI+YfsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3Z5d+X3h5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 4736 msedge.exe 4736 msedge.exe 2528 identity_helper.exe 2528 identity_helper.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3016 4736 msedge.exe 82 PID 4736 wrote to memory of 3016 4736 msedge.exe 82 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1560 4736 msedge.exe 83 PID 4736 wrote to memory of 1032 4736 msedge.exe 84 PID 4736 wrote to memory of 1032 4736 msedge.exe 84 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85 PID 4736 wrote to memory of 2724 4736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\606665a075ec52ebd745ced75daf67e9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9cb046f8,0x7fff9cb04708,0x7fff9cb047182⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,11369448147720479837,4891303358348201067,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5820b3254f1595c540b1339f113b5e432
SHA1f41bb8c7b3837ffb6767a30bb75c43717cbaf3c4
SHA256743304283848a18dc0d711b81c68e1eaa457803b045e1e96c641244d851d5381
SHA5125ba16f26ab1efbc548e06900c54e399cab9f228b1be578c6a06bed1b988e414ca544170f92c24edff826d4ef9d716a66c32fd647c47c9ed94ab4715b62af3df3
-
Filesize
6KB
MD5a4d73bfe055d39cf7c6301b7184ccf08
SHA1c50c128af107c57efab4436fca0fffbf3975cb48
SHA256c814ad40de584aeb5a711e9c88e037a4c51b1547a99e9e61357f4ed886f3f5aa
SHA512216f38a91c917827f5ed184be84472d8b3cc4c3aa7de3df64fdf50df5062a50981c6cd98dea5ae61da730d0318f55aa497b23aede3c4d0307321f72d1fa6afd2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f4ffe2b8e6965e2d2893a6db10d26d75
SHA176b43eb9a13d289cd44407dfb30586c8472bea87
SHA256a92105b4642149d02e619c47c71e3a8a15ca0be257e991be9fbb0a1621380b4d
SHA51209de4978c25e2b81bf5a1c9a6243561536c8de3526efb7c28085918befa0ac7275035be58ea58d37f5477e5384b911325d523657769e3b8164e19d5218f2a4ca