Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
6586b76c4816c4073382ba5cb2880ba3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6586b76c4816c4073382ba5cb2880ba3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6586b76c4816c4073382ba5cb2880ba3_JaffaCakes118.html
-
Size
88KB
-
MD5
6586b76c4816c4073382ba5cb2880ba3
-
SHA1
8b8fd5d150ca42edc9b368e14cf74a630b588681
-
SHA256
50b8eea56ff848c6885e0634881dfced2ac05fd321b679e6a86f2a1e116b17dc
-
SHA512
aef098621a661a85b42fe3fab78f48e12ad4b6db398ca1042e35f03b3255b05dcf30a380fe48ea75c87a69bb00623eaf53a2f4995b4bf0945fe84dd041c3f7f0
-
SSDEEP
768:NGBzvNuqJL+1DcPyhpvFblwvl1Ic2u4nVTK1w:NczvgqL+1AqFblwvlGc2u4VTKK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1400 msedge.exe 1400 msedge.exe 3436 msedge.exe 3436 msedge.exe 116 identity_helper.exe 116 identity_helper.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3436 wrote to memory of 3004 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3004 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3000 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 1400 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 1400 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe PID 3436 wrote to memory of 3464 3436 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6586b76c4816c4073382ba5cb2880ba3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcaaf146f8,0x7ffcaaf14708,0x7ffcaaf147182⤵PID:3004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:3464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:1800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:1036
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:212
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4796
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7640681182371164534,17798444605499187069,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD564603806fdef8b419adb9252600c7e24
SHA1a7019efbdd4e4b6d40ac7004cd9aa46b7d026ea9
SHA256fc1e476add17bf60d8b40f3cac9b1c158799d75db73ce39302a7a71cc032af92
SHA512b0c5edea97e20667633a831fc477e6c1eb85ceb9fa7523dc0a8caf7d5a4be632cdbc93df8593270a440c8595e5d3a99b7a6530e8eba6b4ee8acb0abd9c3d049a
-
Filesize
2KB
MD53c667e0fa9bd1353a869cc6f4f0f9b20
SHA1b7c18131878a77117050822e3fcfa4541228944a
SHA256c092fbcf6d4fa87b0d2c9af5381a43bbec70a1b36329caa1fd5bcc3cb814f4ed
SHA51280dabee5a11154eaf733415d8a3ae3d4832132a8162259eed4718bcef85f213620acd1338e4f8f4ae8f4a032e7c7fd8b81107a6aaf2e258042aef480614ea64f
-
Filesize
5KB
MD55bf3640e23ce5c099044c97330e55673
SHA1d076208d333995df4c81596f8d23ac809e320bcd
SHA256d77c28680a0486e8a485eab5e4fe710fd02ebac56689f6a8c2cc250747eb6404
SHA5121d08a78de1a30427a7733e13264f2a87945f52a71d202e07ff54efc38bc20f68d4d88b6acbc75970b2c47c9159f3d51d5a06b69ab21c5363d26aea85bd22139c
-
Filesize
7KB
MD54f27ab17b4c52bb31127689e5f359656
SHA1a59db99dcd931bb4d747d0f357df5db1f6390417
SHA256a87af9da834a8c62ae8c661818b8aa60281835d311e8a12c8348de376e4be588
SHA512407c31af267bdb4674a14d496f069afcf8af3e93aa5d104ac1f1e19c26b5006f9b6f69df5816f56fac7f1dea3f8b39d6aab7184c2b8f760c7d09808b68cb648c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5382ed34337473512d1515d1291bdf2c2
SHA1be1c0582156f664a2042de4e70211ff96919adf1
SHA25667cc4fccc09400185f7023122593015eb143914fd9c7eeb49294f36f229cbb62
SHA5126c53b08fc2d3ce23203ad40d049b3279a81a03539e2759335b4a534878450dd9dd9726d4cb43a0b06341221b44c1404bd2cb4984bd526952c13b278819a4649e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e