Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
6849f0889ef05db32f692d103e828f77_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6849f0889ef05db32f692d103e828f77_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6849f0889ef05db32f692d103e828f77_JaffaCakes118.html
-
Size
503KB
-
MD5
6849f0889ef05db32f692d103e828f77
-
SHA1
20abb03817e6911b8a4281695193009a702f3b8a
-
SHA256
9c8113f4f6480ceaa67c821278a497c9251fea203516285ae515dd367bbde6a6
-
SHA512
50d57b426c4048a6bd4d4e490dbe93140f1c1a7041d606c5a2caf59bce07b4703d4d0e478c0c0a4a643bc638875a53d759d6e812eb966ef97c9dece2c3ff3ff4
-
SSDEEP
3072:wo+IpBxYUV19zfsZ9PwVeL5AmPTmBcM2mqn1R:wo+IpBxKZtLTd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3368 msedge.exe 3368 msedge.exe 1100 msedge.exe 1100 msedge.exe 4820 identity_helper.exe 4820 identity_helper.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1100 wrote to memory of 3220 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 3220 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 1248 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 3368 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 3368 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4932 1100 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6849f0889ef05db32f692d103e828f77_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeec7246f8,0x7ffeec724708,0x7ffeec7247182⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9360286849991596613,7261878737591514471,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD547d4074d655abf25d26024ea11ccac33
SHA169da316e6982444a49cc255830b21e588d75abbd
SHA256ac69b7e477ed5ea76685b0dbeceea5d977e5c7d5580aba49c4efdc0aae92bc85
SHA512fd56f1d14882cc7c4794ae880c8ffcb86286f52e03e08af4913e43f7f9467c4b93ab865988b2c4c01bf7f8262db931bd8f1058fbec5f96068702b5cb2b73c55c
-
Filesize
1KB
MD5e6bff5cc95c7732827f67100fe3aaf78
SHA155463bcdfd2ef5669504acb59c8d0d66f3e6ed6b
SHA25664013fb1cc3d10d96d6040a47da9f824a000ced2b7c93fc529327755332de006
SHA512b9ef33105084c4cdb3efd33b06f4fa9e8a9785358db629cfde7982016da9ce69fc065bc47f31a287fd90b419c68b9ebceb62278dc20873b6ab6114a2d2607e70
-
Filesize
5KB
MD5459fe0a9b6f1e91b09e04076f6baac1d
SHA1e7fe411ca308400cc4d8024ecd9a7e92cb387458
SHA256d8780e0abfbf59bd8ff95f52a41c486d418b02616e8ad67e12b5d144ffe34b2e
SHA512af1661b9867ff62e4aec151bcf3facc4fcc1e683160b2d2f08235102ef082457bf3d07e97ac2c9596d7558dd9af074693b330664947d10cd6513730bc883bba0
-
Filesize
7KB
MD5a76ba457c0dbc92c7f9ab6a5a8af42e8
SHA1738dcc0885b838cc9e420b39c2d887a08299c8dd
SHA256c19f545169e66e6103584dd9572d6a687f34e7a532ba6f57b0258e41bd81048a
SHA512ba8dc152764bff82506958f3561019f537d96a66020b3d411e8812ecf0817368544216d94ddbd7d271b06a10fd918297f73d421d43f48a3ba88f9a2eb628450a
-
Filesize
6KB
MD5c4ce4bfab91efaaf1435f45f01a62310
SHA139d93b77659a155559a87ff0140cb9bab753ebd6
SHA256c70b166c408cfae05cddf73fb3c900f54b4fe3d0952f3f68233278df67998511
SHA512098b1914460503688262a8fc5dc264846b55098601c4c4a0f6f5bdd851c736295f9943664cac676a5e7d09b0e619dab1f6350db0d2bfdcbff894812af45bcc92
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51d512fddbac502904d8d2f5f8a946c7c
SHA10c871e83415738ce28524e31ea0083dd1661cfaf
SHA256e98692c301dde092f4e772a6d64294cde0f427fe38fc3de3c54ab6b5e7c3b484
SHA512f44ed19f6029d2ce56fb564aac7fee159c70700958a2a5f15faed5df4a09dd1be11f51e5ff1cc0b5ed352ba825ffea25d5c85f823aec79da24fcfeed990f1e5e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e