Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
6903f5efd055838ad6300afe7cb178f4_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6903f5efd055838ad6300afe7cb178f4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6903f5efd055838ad6300afe7cb178f4_JaffaCakes118.html
-
Size
1.8MB
-
MD5
6903f5efd055838ad6300afe7cb178f4
-
SHA1
ebf4879081510eb016b369d31c22ddd703a0b836
-
SHA256
3d48656ee1663bef35417b0660ed29eab7bbfd2809655944af707d5d1a30b773
-
SHA512
8f45d2008c655d4a9e87ad2add11ceac5e8649531cbc2c9540442d97e9e08bb24945b457a4cf6c4b93a6a0fea8b39727d410c9b18aca2552dc213728085afdb1
-
SSDEEP
24576:b+Wt9Bm+Wt9Bt+Wt9B1+Wt9B5+Wt9Bi+Wt9BX+Wt9Bz+Wt9Bb+Wt9Bk+Wt9Bp+Wy:h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4588 msedge.exe 4588 msedge.exe 3612 msedge.exe 3612 msedge.exe 3244 identity_helper.exe 3244 identity_helper.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3612 wrote to memory of 3080 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3080 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 3160 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 4588 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 4588 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe PID 3612 wrote to memory of 440 3612 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6903f5efd055838ad6300afe7cb178f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:3080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:3160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:1548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:1136
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 /prefetch:82⤵PID:4032
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12819767331847195086,7842357019404412330,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\747a20b7-dffa-44ec-801a-64b59b13275a.tmp
Filesize6KB
MD54e750657cc943faf7111106931adea7a
SHA1a0561da5a26e63991345f84c8d12e917c9b9e428
SHA2567cc0be6c29c275dfc3b14f4561a0fb38d3b0fe78e290104316a983b5c0ba8e9a
SHA512b82583b102ee5b884308377b85301c0d51b105e6220cca3df85fc6f0468edc4b48c53800b305148881152932bad05c81691f4eb912ed146cd17eed67dfa8b8a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5012ea68b53854a93608a3398cacfe5e4
SHA113767d7b4e48c9532860b9fb45d4f5908f3e7aac
SHA25678771a5ae2f484a0f9d5c8c1eee053cf2b6899b8877b3e2605eab7c71a4cedb6
SHA512c76e77cdd1331278bf173418a81383dcadc6cfe67ddcb8c3ef9f9371ed60084f67911a15a93a58970a82669b8a20691385e279b5a877914797e49bf31619d6be
-
Filesize
643B
MD51f7a6020c535a595bca7453e01f688be
SHA15791f025b08a94311128e4cde5569f05061cdf2f
SHA2565c8cf12ef7726ae62a66da626199b6fdce82ad8252715144d5e92ac100ed3152
SHA51242cba9ab9a3f4fcee42309f37bd812ae59d22e435a3b5fc68a80a51f4da206a1adb5641d7b6a63b1baf747c1f2c10f1bc12fe6f5a64f417b1180d3d690f4d066
-
Filesize
5KB
MD504d7433df7f21ec886f7b00b602682ce
SHA1f5e85ba48cded620c5c5f2393fb2b63a2ca9914b
SHA256d5d26632cb1afe2bb0a8bf765a739f5ed1da697e007129c870c0a922772feb07
SHA51230bd3aaa757821e2411bbaeb5f4d35d54d2ed2571d65631d5a88d2be4830e01fabec1d404d7548c18c7447c73d8b85db24e9ffc28b9643ca4ab4533f38ed8527
-
Filesize
6KB
MD5b3e79df5e4358eba0e171b6a84d5c14e
SHA1b6a640356b2cce072eb75f60532c8ed710767ba1
SHA256279ad71a700da08a318f4118f3e76f2b9d90930f74e094cb51da08d99324eaf9
SHA5121209f1fcc62821be7689c9a71f253bd782b1edfdb230932b5ca1f5d24e6b35e811d425398b9991124a310d4c51373612b15e94c05242bed19906eede26fad631
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51913227e92477f65abee945c1864c93e
SHA17ed7be2bc7608614ee9de0ae44a528a6ee0eec36
SHA25689834448076f1e442b77601d7214a648601b5ece5ef9cd58f23f8cc201dbcfe8
SHA512aab3c11d0e71aaa0baaf732767172d97816f578702f67018d5cb119b6aa4ba6eab7d7e4e7e3068760ae11b2a47f5bf2d6d03f27cae951a24ed0614b4547f2e3a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e