Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
6865a656c4d05ca2b8687fe75b1cc4e3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6865a656c4d05ca2b8687fe75b1cc4e3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6865a656c4d05ca2b8687fe75b1cc4e3_JaffaCakes118.html
-
Size
123KB
-
MD5
6865a656c4d05ca2b8687fe75b1cc4e3
-
SHA1
bf4809cbcba66f89f6666a14b17bc73f84a26e23
-
SHA256
8bf12454aa049f398f62dd206bd7122667b443651ae8f5ae93c2fa3b4423ce19
-
SHA512
d4b0bbe674babeb1dabc683b5e064974276ecd226da5d6c5e37ae05680e9d1aaaf6c2fab2f475815f00e1a7d36dbe125eaa1c2c4104315f203c0b3cabdd49c34
-
SSDEEP
3072:HP8crwFx9meTxO5OfcFvtqL7Zl5vA1asCFexORbSUhSbtOlDMXRPBLNEMT9Y:0L7Zl5vA1KexORhSb4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 1144 msedge.exe 1144 msedge.exe 1520 identity_helper.exe 1520 identity_helper.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1144 wrote to memory of 3212 1144 msedge.exe 83 PID 1144 wrote to memory of 3212 1144 msedge.exe 83 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 2892 1144 msedge.exe 84 PID 1144 wrote to memory of 3464 1144 msedge.exe 85 PID 1144 wrote to memory of 3464 1144 msedge.exe 85 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86 PID 1144 wrote to memory of 1984 1144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6865a656c4d05ca2b8687fe75b1cc4e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d05046f8,0x7ff8d0504708,0x7ff8d05047182⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,4897582109702524868,11646028192560981200,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
860B
MD556032c3f0f434cdcc17ce64e4db874dd
SHA1fe543a51f7d3b517015a9aa4a15ee9c58a1ae76c
SHA256b643520d12dd6ce41fca31624ce69a46d65ab761f0996ee4729f8e66f73b7b92
SHA512147377465d8f1b1b2c8174bf8898e941b95a18dd39ffc7c1e0359c6718db9ca493f5619d34fdc28cde8ab24076ae0bc9fc5313330839ed6fcf0ff2bdf8047922
-
Filesize
829B
MD5bc64c897fe6b28a45cbd4c85abbced62
SHA110578f2416c5c4165bc23f1801f9d1808b9617e8
SHA2561660daeb5c47e96233d3a35622c542e6be4d258913238a32bda3fdce496b9fde
SHA512c1a7f65691f76582226c570c4317b1ca151cebb47beb7f28481d4795ec8624b8ab80cd7f0da10b025581476e495d46f5100209db9bab600af8d7c3dbf4416f23
-
Filesize
5KB
MD5b6314bacfb5573ca9d05530af7700747
SHA11549fb2954ea9f749af6767172316ef9d567641a
SHA256bebeaff354f1fbcde3f6c22682418cb2bc07fe5d41ca1af0a496f8f4012315b1
SHA512e24269351f388b70c26f08d1eb82f8e4974cf84403fc1aa39fc9ffc18e96348488dc4fab530db7537887b795ad70bf1d279f28f095c6529d9af85c50ae616a00
-
Filesize
6KB
MD58c953e444e3066097f51eb39ac511513
SHA1636981947aa824dabfa4ad591fe47f9b351118f9
SHA256edfa672ebf559005a7a087b177c5853951ea67ee3626af8c66171f1a5c3848dd
SHA512cb59bbaa87e4bc1b7a04df31277afce27b7e1c8bf13db3996ba6c472c7b06bde4e54a34c055a2e591d78eb3e46b6ceb53070072e08a0a52f9dc5cbb7bc557035
-
Filesize
6KB
MD5da955925bf8ce8f424ab1f3e2b52691f
SHA1accff85dee32b894fbca18958e28da608bc69ba7
SHA256b94c3b389643179346820902898c1b901c439cf9fc8f68f0815565cb49a1100d
SHA512883876a33fb29d84f961983061e54393a4566f9a95d933509b74d1afb83d68711bceb649cf2a7689234fd04ec3d9dc98a1f82d6361fa271bb76db3992650b0c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f88bde15034cb19ea364cea9c797ea4f
SHA189a89198148db4344b79fe75b3ba5495f1c9db6d
SHA256cfcd21ad522100089ea36c24252c2668d678085c195ea1d05df8cd316c2ca37f
SHA512e60db58d60f56829adc2026329c39f544c2938e3deaa754c691d3c81f1c603b55647c9f3099d1f842b50b58fd3246bd6c272814df8f41eff1e6fbfe9c57c0810