Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
6583bcbe2f44c0c72c93981aa6302be2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6583bcbe2f44c0c72c93981aa6302be2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6583bcbe2f44c0c72c93981aa6302be2_JaffaCakes118.html
-
Size
25KB
-
MD5
6583bcbe2f44c0c72c93981aa6302be2
-
SHA1
8ae7bb81dc85ac94108922d29b74ac277cd10c67
-
SHA256
e21f554b1850448c669f43c03e077b3c07dfebcc9494814e6e5cec361d4df09a
-
SHA512
ee5201140b8bda4e675d3de21825f22cbb0fc29cddfa13462198f778d4b124aca84a8c12d00ce4121554b8ead7f4621592576614c78f828b17b5cf648841a743
-
SSDEEP
384:sGIOQG0UqemBTSwlNvvMuvRdqY4Gdhkj3p7yuG5VgystOHS/tERKYW:sGIl9demBTSoNv4DGdE57Ue/tERKT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3624 msedge.exe 3624 msedge.exe 828 msedge.exe 828 msedge.exe 3712 identity_helper.exe 3712 identity_helper.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 828 wrote to memory of 4868 828 msedge.exe msedge.exe PID 828 wrote to memory of 4868 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3596 828 msedge.exe msedge.exe PID 828 wrote to memory of 3624 828 msedge.exe msedge.exe PID 828 wrote to memory of 3624 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe PID 828 wrote to memory of 4636 828 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6583bcbe2f44c0c72c93981aa6302be2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff935e46f8,0x7fff935e4708,0x7fff935e47182⤵PID:4868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:4636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3112
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3592
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:1452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:3008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12496234908399984241,16152780235987931496,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1360 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
184B
MD55b55d7e6f5e6cc640d61582a3ccf8071
SHA1b7cba443ef8d2f024e793d685d692992b4264531
SHA2561ab704a43138b5c4b97d760f249fb8e13be6b3dac3bd0dd9073d628cea165b2c
SHA5125e90fa42d626f3d8b7ad622864dac0502e3ac5b2759771e6092fffc087422307da9134f6ef149f1425764989a0f6724315586c79a991534c82a88b0ec592dd39
-
Filesize
6KB
MD5cb91049db4701cf2e53a6ae5c71d0c95
SHA17a2b40e38d99a415716ec3c8567b3a7856790b8c
SHA25657a1272398c7aa35f1bf8c59022f97013fceb0edd080d4b204b373e11e59de0a
SHA512c5755f2bff53425130fc328f84bc5a229f233b72ddfd391c8b532f23b9d9ebaf8be6f2351512dfbf964c4a89665519e3136d7ca30fec7047f5aa9e280ff4d04b
-
Filesize
6KB
MD57b8c2b94bc560886ff5670540f4c1e07
SHA17105cf741a6ffc8d1bffafe620f65b06352a0981
SHA25667d5617d1ffed73f567d9a562b2652c467a13178f28330de3aef5e3bb08bfd8c
SHA512710595003386f0a0c7fc446ca89ff1657312d24e4ead3fed3649597e121991a89e0d7765f355f38469ef2edf5cf173849178bc66cd6a80b340dc7b6126c92467
-
Filesize
6KB
MD5bff7790a735ff15f466399679200a5fd
SHA1c88911c0cfa088ef882614a17a86b617e7204a8e
SHA256d3ea6d3cb200960421758ba95d011d5713b97fea4a38d77cbb4e9f0535656074
SHA512ac7768a420e3ebd4ff6f905394072a97ff3b0305c7c0d3441bbaa01290681c9295f3880078e432cca1af900b4c3d333af3844cbb8c8bce72fe3ebafe3a969819
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c88af0cc068d37f18abe13b4b381777e
SHA11a192343bd9a740d6e0f666a55110633e43f6999
SHA2568585128cf91b7d38aaf36a3cfa1b63e89872c016aa51f4cc5222541417877bcd
SHA51295e38100e6bc554f529560cd6c8e97d7d67042bbdd7e52135f36678aa67cc6a39a8ef6615d7e1a299c6747e3a132eecec78d795605ea91a3d5d58906123da62e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e