Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
6877e3180196591f165ac1d6de063aa4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6877e3180196591f165ac1d6de063aa4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6877e3180196591f165ac1d6de063aa4_JaffaCakes118.html
-
Size
361KB
-
MD5
6877e3180196591f165ac1d6de063aa4
-
SHA1
7828a7a0d7f793fe5f180eecdeca54c617d8f0a7
-
SHA256
d6b962ddf2be95afee4f6671f3abebe476516d31ae2503b24997965a9cb05175
-
SHA512
42e4a7ab5636f2a56fc07c959d49914cd5f1bca8eb2909a5cdaab03333bdcc34737f493fca56fa4102c0d6ac9afef1291aa3a69c771b17c063e7993c54b051e0
-
SSDEEP
3072:Lnu2RE0bl2/K/CRh6T8/Z/BQhpI5e7oQgwKRmt:3oQgwKRmt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 5096 msedge.exe 5096 msedge.exe 4812 msedge.exe 4812 msedge.exe 1080 identity_helper.exe 1080 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4812 wrote to memory of 2184 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 2184 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4296 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 5096 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 5096 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 4492 4812 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6877e3180196591f165ac1d6de063aa4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e2e46f8,0x7ffd5e2e4708,0x7ffd5e2e47182⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,16942154301117754180,10553635226308022997,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5792 /prefetch:22⤵PID:1028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
188B
MD506b053870aeafb9626a3b5811ccd994a
SHA1d88305e47ea47e234be3659546db33e5bfae8717
SHA256c3fdeb105b90eacca573ba56b3c14fa5a8690400884388cc0c789d20b9a4cd42
SHA512f2b890bd469f7f2cbeebe1e3aa1c6ae5aa01d73e21b60a55cff405ee4bc236ab8d1d494b555772b2ec1370f5b508b1aa6edbaf30024df01910e28b4c40b66627
-
Filesize
5KB
MD527004378dd0056ce1fb501b1fec0a952
SHA1ec3f08bf30b86ca547c15285983834175ad17415
SHA256ae97fe7a35650b42c869d1f817aacd96ce910d9a92fffbbff5e018016f8acf9d
SHA5124d2cd23c3a38969f7ec0cf34b5c74344a5df2a7e000c9cd9368a37259208ceb6f562849dd277158993ec64a5937cd1842f48985d0202465013ebf60638a5b593
-
Filesize
6KB
MD53d9b9682a8c92c932fdb7e28f16537e7
SHA1a64bbd298dbf713dce664f4b686245b34ff482de
SHA256641c7a6e9a3039df03e3b440d0a2092c7e73f832b8f8b0359cc7b85d265d34fa
SHA5128f79547c272ba9b160f07ba4de815b47dcf733976d4ca218937b0d471d0d2cd4479ed273ef9bb3137e68c0c606e523af691418430f38c825598dfe3a5b8e0fe8
-
Filesize
203B
MD5dd7a8599def0f6a8f0d7e22fb1b01f63
SHA1dc78965a9b49a168420fa0564cf44b6aa5a27e5c
SHA256a84e40732d23f279313c902c8c96287d49d360332d79473d44fddfe6ebb41b87
SHA5124a10d6f2d0ed564c556272b692c2c2c04e394f464b97508c48f4f9115bce1c90eb4411e3338d9394801654af5f8f99cc5c1d85ea5450042b5a95c6bf780ef979
-
Filesize
203B
MD5805699f5a1eef37626aff3c2417423b2
SHA1fd10869d0d53d01cba4d3097a6025429c4300c3f
SHA256429ac16e09b29e695b745afcb1277549fda88c48edffc47b8fc885ea77a92606
SHA512a91bc4d7e51c55223e817eab11ddc10137e7271dda14d9ae117850340ebaef13180280bf296ef53eab1abeb1b48a0ccab2e366f5b1ad79831a660c11e7f2bee2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58584b5d26d2a9e92bc5e2eced15c9c70
SHA1d38af00b483606158fe414772ef5207f19e4748a
SHA25639997c9b00b4ecbfb90cf02ea3d60e6bf6cf869ca918160d84263b87af501852
SHA512df8f8c27cbbe333fe087ff2ef030fa5950b705fd9d76bafaece37c1170872b06e0e324f4487bfd4d9a0c5448bd350d89f58ac8798bb8af47e39f6048d2fed3cd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e