Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
6579d170c83563d47c9f47ac372a8814_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6579d170c83563d47c9f47ac372a8814_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6579d170c83563d47c9f47ac372a8814_JaffaCakes118.html
-
Size
218KB
-
MD5
6579d170c83563d47c9f47ac372a8814
-
SHA1
2b56d6f06b588a0995f69a69d6dbc5171a84cf59
-
SHA256
0c7b8a80b0bd157b744cba7a7eb7c40679366099b27f599e9d9d6e274eb04aa7
-
SHA512
d4caaa905bd91fc12a8cc41eb550bb10a78c0d192fe4a2d29381f5793c8bad36c744fbffdfa24b2e6387e6499c0e606cb8ebac9d33e939220abfd92dac3775e7
-
SSDEEP
3072:Sd1+3kPKhrYyfkMY+BES09JXAnyrZalI+YQ:Sd1FPKdVsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2704 msedge.exe 2704 msedge.exe 3456 msedge.exe 3456 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3456 wrote to memory of 632 3456 msedge.exe 83 PID 3456 wrote to memory of 632 3456 msedge.exe 83 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 3840 3456 msedge.exe 84 PID 3456 wrote to memory of 2704 3456 msedge.exe 85 PID 3456 wrote to memory of 2704 3456 msedge.exe 85 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86 PID 3456 wrote to memory of 2320 3456 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6579d170c83563d47c9f47ac372a8814_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa94c146f8,0x7ffa94c14708,0x7ffa94c147182⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8950814980619472776,243964433983797041,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8950814980619472776,243964433983797041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8950814980619472776,243964433983797041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8950814980619472776,243964433983797041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8950814980619472776,243964433983797041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8950814980619472776,243964433983797041,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD55e608db92a9b93ed92112c9e075d702b
SHA1df1273d3fa81d133fb0447aae7f0d48b2cd31a24
SHA2563ef67c9a2251139b999bc683bce26c9b704eb0a800a1ea7d1852e5e7ff4ccde0
SHA512c4b63efa78752847263a077dde311425ffd516965909530aed42c76bdc68cf40527229bb1422d68d2595c49735af16d02c986ce6025ca23a227bd8614268ac21
-
Filesize
6KB
MD55f855ac0d950cc0cbc9aadd6af1b0d8b
SHA1c60674f3a4a7feef1cd2d13b44fcd83f26b8d825
SHA2562d8ea4c22c87b44b4445be627e2713e1523b482c0448a4d17bd89d194388f83d
SHA51231dc4137447f69e3e1a66c4d6522239d588693db340e11170e30ebe1ef8dc884ff22e747e3c34cdc4bf876c7b8ce9c141e80a9a2b4585d309e37be85a6e1a764
-
Filesize
11KB
MD59824a274cdc458b2e8ea3153f397756d
SHA18a6fe9a1645868771c39c19d47996f82a3eb23bc
SHA2569b31fbffa777821154fcf418a13144c3f862c984cd367e05422591a0c3ed2612
SHA512349559bd763c21c96a7d90307648d7d030133446f552bab9aacffab88bfa41a129d7664e59ccbba1e3cbef0110a83d0e38045f516c884346532dc6b46153bfb0