Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
6477a93defc53ad20006c62693e44be5_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6477a93defc53ad20006c62693e44be5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6477a93defc53ad20006c62693e44be5_JaffaCakes118.html
-
Size
33KB
-
MD5
6477a93defc53ad20006c62693e44be5
-
SHA1
7f693d94f23e72bda21dfbe8b0da3e4cbbebdb49
-
SHA256
9acdab750676434e83adbf1233da2f37cf01d456a0176b25b27d6fd148acf645
-
SHA512
71d34d644a97cbf3066fe443ab6576f5ef9833bb7f7ac38fe7f4a88fc4a01936f80c2c75282fac3a74fe1ed2c5bf396e51fedda2ee5f535361fd80479d80e939
-
SSDEEP
768:/s2lYtjDI/4xcN5q80qqkadvkwG9Tj4BTsHlUkTpWh/NOUz:FOONXGvkwG9Tj4FsHlTUVNv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3540 msedge.exe 3540 msedge.exe 2968 msedge.exe 2968 msedge.exe 3920 identity_helper.exe 3920 identity_helper.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2968 wrote to memory of 4784 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 4784 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 5000 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 3540 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 3540 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe PID 2968 wrote to memory of 2248 2968 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6477a93defc53ad20006c62693e44be5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86ae746f8,0x7ff86ae74708,0x7ff86ae747182⤵PID:4784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:5000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 /prefetch:82⤵PID:2248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2668
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:2960
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13136305903303083824,1980832241972044569,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
189B
MD5443319881835b14fda88caab9945e84c
SHA1adb420bd20774e8eabc4d3d53ecfccb20ae7cb54
SHA256fd79d0831e92ccbffc20eed3a0d07b39a121b4f3be4f720d2981fdd2e7b5b8da
SHA51239c2c7fd638c04ce244473831d3dc8175e8e9ecb9a0df38370300233202d7d7fa9166912b8d97b34efd7b90eab6da376191e1c5c9ce253e96c9686b886ab29fb
-
Filesize
5KB
MD5f8372e9d126442842d25af8e89b4a7d1
SHA1595be03e70ca083292178f0eac857f2e0654a923
SHA25611b5f17de417ed6c93a68e77d9a7e7cf710dd6cc870cd2cb5b90b2fc07aa137f
SHA5128b24ef81fff741ac10773b071b4dca6d643f35584f87a52646fc3c3f03870cf49c9cf6a0ce72364a6fcccca5404487e61321df058cd8a2f4534aa92af0d9d998
-
Filesize
6KB
MD50b2e7e8cb4b60e0ee835c7b7669166c0
SHA103af908316dc332b1ed8a31ad24025300256f666
SHA256eeb9c5b971a99d56d6ca74b6bfe0ca5601daddaf21e4787ea180428f2bbfdd31
SHA512be97515fb89e631a2a56e19b2166c782ee1a711852847cb02191d86f4a62b0e2ede48e6e45144ffa0d79c46dfb4609fcb5cb255e6d4a8c91005468bfadc36306
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5513fcb4c679a4c344762a1492024b73f
SHA1b50fa9405fe0f044a55f8c63bcf47cb8b5f82062
SHA25646c586f693525f7d3274a4ae291ab9c73c399fec9e4adec507d374d3c7bce4b0
SHA512c748d5eb4d43271f0b1d93ca1ef72104717425f1c0cdd4b8256c0a67f7e05a8ba8585a1961e21d7b84290ba82be8e612c7f043cc492c97e7ce717e028b3b02b2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e