Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
6647debcc4b3ec06b0cadc714f44907e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6647debcc4b3ec06b0cadc714f44907e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6647debcc4b3ec06b0cadc714f44907e_JaffaCakes118.html
-
Size
175KB
-
MD5
6647debcc4b3ec06b0cadc714f44907e
-
SHA1
d007860e5c43f03cbbf79d107067272000329b10
-
SHA256
3dc66d7a5446a2e742e5beac66cf05d1d4fb6d0b95e21ee07153d944607864e9
-
SHA512
26cf4641d92b02ae3545692ef405ed631a458012c24dc064f2fce0af110b816e6d77971200954c1f4484b3e91317bd36893fa625fedc5c3dad9fe44bf64c8eea
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3mGNkF8YfBCJiZo+aeTH+WK/Lf1/hpnVSV:SHCT3m/FZBCJi/B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 848 msedge.exe 848 msedge.exe 3048 identity_helper.exe 3048 identity_helper.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 4592 848 msedge.exe 83 PID 848 wrote to memory of 4592 848 msedge.exe 83 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1380 848 msedge.exe 84 PID 848 wrote to memory of 1124 848 msedge.exe 85 PID 848 wrote to memory of 1124 848 msedge.exe 85 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86 PID 848 wrote to memory of 4112 848 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6647debcc4b3ec06b0cadc714f44907e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12ef46f8,0x7fff12ef4708,0x7fff12ef47182⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,11078377769685331196,13134279026395311118,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD512658a000bdd0388f588f13e7fdf327e
SHA1c0775165425d2dd317fb560acedc4a0dccc2450e
SHA2561a426233e9882aaf6d2e85233dc3db54452200000402582ce02f36fc03367128
SHA512b715ed86fdd9362b2dcf4ea11b9e6f37413a796a3cf9e4ab54edb84f078ed71798f70341c5121694e96a79c52c81aafc794e5728367e2cb59c817bc1b3b777af
-
Filesize
2KB
MD551cd65a134c89b2e95e97f521ab6b118
SHA15a6765a579285654c51050ce314967e2ee7ca66c
SHA25697df590eeb1d64f3c11c9075dd8223f0f89c8c3f66aa2bbdcbd645f151c24999
SHA5124c9d2ad2a6c7e6571c0b18d248a8bdf61fc5d589f39fee56d043389e11544971fd94049baeef342854608c1a3d145aac66cce5479cc190d79b1d90c83c99f07a
-
Filesize
2KB
MD5867a7ed4aa060d54552d4bc02cb8a46c
SHA1bbf5fe6bb3a2b10d7bb33b33d7eecf784b8edcec
SHA2564063af099e2afd608db46e37760a68b3581a9870b567a8fce8cf2f544ec14f93
SHA512d64233d0fd4a4a54b13a5f1ceab70df5bbd44dd280f3c3687d56104a81d6b04dc21b1c7b4acef041227593468a0a3823ba52675bffe88b87993dd4620298f208
-
Filesize
7KB
MD517c162274e7d7618f07186746467a1ab
SHA124eaef112534323d71e6e44b1bce33a1f6da20fa
SHA256b6c8d6b38d6da73b98812e15d66c1584104a78f2a8054dd86cf1610af16284f7
SHA512dff10ac5d267cc694124a4b6d589ec1d6e673b8d3326feb4f9ac96012f022d0faef0656edd886b374d3ededec868fc5b936c994cef02538b567029a54bab9653
-
Filesize
5KB
MD5dbacd9f38c15f3ac0d6c0b188e55ff60
SHA11e22f10262b729ef59837629beb9ffcaad96a141
SHA256b1f35abfcdc8b09217739447b082af712273f26e5daa5059c5ac4c0e9a6c3963
SHA512def3f4716f91117c0208f3958e680d08fe4137741fe5a210fc2eec17d1910cfdd3806f8c1fb4ed4d0c4c444fb717b91109cbfbece77efe3fcd6619f9780607a9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54759c7c0d6b52b8d91f0ed0f1fc1af1d
SHA1d93b595008bbd76d86220bfb239cae1607fa4789
SHA2569044216fb5e7ac4ec4c1224d60038e601a86935c98da199aa370e4440ff39a09
SHA512921045613e730f4d3d445b7a37de0f5b49d173457de48168f18d6e37444d5a0490afbf4fb8176022cc9f771e229cee7483c07c82e40bbc8fdbbe97862ab185c2