Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
6068ce61ee2569e27f83766a05175d7f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6068ce61ee2569e27f83766a05175d7f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6068ce61ee2569e27f83766a05175d7f_JaffaCakes118.html
-
Size
211KB
-
MD5
6068ce61ee2569e27f83766a05175d7f
-
SHA1
0f10075f9b9f5463a03fbe539c62961b69f53b75
-
SHA256
97f443e4e3c97232af28a9e61d0bf8665b8290a9b7f55d952c831d55e1bc5789
-
SHA512
51478287b3e36cfae799bae6571c760779e7c21dadc0b57d0006db5dd8174195827b3a79365d3a16b8deea179fbf26f58ea69476d2e8844b0d4089aaf74d5580
-
SSDEEP
3072:S9HyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SwsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1484 msedge.exe 1484 msedge.exe 2524 identity_helper.exe 2524 identity_helper.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1424 1484 msedge.exe 81 PID 1484 wrote to memory of 1424 1484 msedge.exe 81 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 548 1484 msedge.exe 82 PID 1484 wrote to memory of 1864 1484 msedge.exe 83 PID 1484 wrote to memory of 1864 1484 msedge.exe 83 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84 PID 1484 wrote to memory of 372 1484 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6068ce61ee2569e27f83766a05175d7f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd168946f8,0x7ffd16894708,0x7ffd168947182⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15849239469247686755,3884408534676597735,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD55f9bf1b9ac767bf4a9f334670a003bba
SHA1eec0b2e1fd3f5eb22e04be8fba93183265ce6216
SHA256619d8a7caf2ebeb230e5b8215619998642875acc02de70e8997631ec9f02b783
SHA512afa0044f442fca25fa828b96c484921e0a4ac6c29bfce23b1040545817cfcd5cd57708cc354427620e72f42510edf1d2c5cd569e873407e98d0691204746af7b
-
Filesize
6KB
MD5fd6bb71aa0f73228cfd0ec278439a668
SHA1e587c2748dcb235d476ac486b2d2def2b3d18735
SHA2566188efb066632dc0720188773e53a05c981e2dd416ef94d6aab1594b15b778cb
SHA512056d80ae2e931679b778f391142b29874e97f1c7cf2078706226d6bf29efe7154eae1740835bf1d60f00c088a1ec4c6ed89eb7a2dcbdc8051d302b20016efd2f
-
Filesize
6KB
MD554e0462ea5aa0ed784922a76ec74d0d0
SHA126ca7db230b7f0302a7460f02757ea630ed15356
SHA256c3421f2a1f4d5b912cfe6397952af02eb7f2517258eedb27c2beecee9fb42380
SHA51220d8cf8ec90f7fb3f3a50ef70be2fb7a5481607028e67f1b44725a855d632514423536a358feb8beec75fff8c99b3ec71d87f7e9569f6a33faaffdb13809acb5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57f6eeadb66819bed7ef78cc545345034
SHA1b28ec458fa0313a3265862c4fa7c1bf40e88197a
SHA25693b58c04de0b668fcd5ca09a244269fa5049a86397ffc5b103727b4e21f2e8f3
SHA51268d3896f2b84ffa393e24b52a4b78e72555f55d01ca41b2f7555340854ed9825aee4809735d8a9b5b05f950aab1c2ecbde87528ca8644c9f9a8ca62222639cdc