Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 04:47
Static task
static1
Behavioral task
behavioral1
Sample
6214a33ac492e75ad8ab6084893c4122_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6214a33ac492e75ad8ab6084893c4122_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6214a33ac492e75ad8ab6084893c4122_JaffaCakes118.html
-
Size
19KB
-
MD5
6214a33ac492e75ad8ab6084893c4122
-
SHA1
5f82d4882e33c826caa70e9ad3182606f1bdd26e
-
SHA256
0138af638b79943019046e0cbe1eee8ed29c6b7644f8d37a478ce1f102864749
-
SHA512
26f1b956cd199b0fd726e01d6f93776f0fb37dfa4c666b92f9194a0c86abb8fac5c675e2832f6d5f4eaa48b4f2b0bd519586ec13aa3b85bb8e7b9600ffcf8d4d
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIR4ZzUnjBhnJ82qDB8:SIMd0I5nvHRsvnixDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2952 msedge.exe 2952 msedge.exe 3948 msedge.exe 3948 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 1828 3948 msedge.exe 83 PID 3948 wrote to memory of 1828 3948 msedge.exe 83 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 3772 3948 msedge.exe 84 PID 3948 wrote to memory of 2952 3948 msedge.exe 85 PID 3948 wrote to memory of 2952 3948 msedge.exe 85 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86 PID 3948 wrote to memory of 4760 3948 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6214a33ac492e75ad8ab6084893c4122_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffadd346f8,0x7fffadd34708,0x7fffadd347182⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8862772301009092706,10234005391515757167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8862772301009092706,10234005391515757167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,8862772301009092706,10234005391515757167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862772301009092706,10234005391515757167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862772301009092706,10234005391515757167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8862772301009092706,10234005391515757167,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5eaffc9e66a5e1abdc480c07e90eed362
SHA14ff53e4b556efcc90d5fb3d127bed1db3e11ff65
SHA256721711bb71728e7cee3fe2eddb06a7231cc29e02f7166995a6bab85aa8962ff2
SHA512e216a2766604bb7a43616cc9926a9155f0d87da7311ebf4877c79feb701141700616af5415953b8cfd1be5fe351564ced0233ce0fb74d8d18f9f83d54c4cd6c2
-
Filesize
6KB
MD5e757842deee1722813ee1dd54663459d
SHA1487a2bc7e19f637031a5d380ebd7dabbc4d70b40
SHA256ad68b3eb855d1fc7915eba70033ff9035d6c68407e7187468fb6c94f62cc53a1
SHA5120d9fa0a5216b64998f9c386ad290ba66b496fd5a3be13bb601d31e8750ef9d68ff70471a4d71777e83a770649aaf75fe31ba8599620f3d184da128128ee72e60
-
Filesize
6KB
MD582657c359590d4f8de05c8634573eb3c
SHA1ca5911369fe5ea90d7e20b2017fe7c34d330e474
SHA256252ad59154499a5b0c2c046a63e0235839854ea6974cbfbdb519655e7f093aed
SHA5121e330f66bdf13c87b76678271522b753e7d2fe7c98bc6bb49fd69fcc9d47ad72a1ffb967750849c86cced3305e457091d9bbed22f368758cd6d3c00489d3bec3
-
Filesize
11KB
MD5a3b34293b3c03fb9001dba3c3f987fcd
SHA1b7bf9932ced50786c5032b8a9f333dedd72f7284
SHA2567cac5de77c0c42128e09e651a031512cd7033096fdd3dfdf5d73392ffbe32255
SHA5127ee8d3e333cec920063e874a44edc83f98292e89276f5503c676ac8986223f36161605e6fe34d5024218c2e7fb1368e2206c82ed4acdeeabbe08a528b67bde56