Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
6888d7613b5647495321ce1167a0b19c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6888d7613b5647495321ce1167a0b19c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6888d7613b5647495321ce1167a0b19c_JaffaCakes118.html
-
Size
36KB
-
MD5
6888d7613b5647495321ce1167a0b19c
-
SHA1
ee778e2eaad183f945c48a0243e9fac9262ec484
-
SHA256
50d40a8241fe60768c5d0b72442b28f3d10baf1c46766a2dedc62f42eb0b9ca0
-
SHA512
1bb9556f056f27a8a5cba802a746fae162d4f187f1a2de18c3205b7825fbbd13c7c131e113cbe0599b3b7df2fd30c6ceb264d96e9d0cdb7256f72f8203a88827
-
SSDEEP
768:zwx/MDTHXv88hAR0ZPXbE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRcy:Q/TbJxNVuu0Sx/c8NK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1704 msedge.exe 1704 msedge.exe 4808 msedge.exe 4808 msedge.exe 4176 identity_helper.exe 4176 identity_helper.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4808 wrote to memory of 1368 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1368 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1012 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1704 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1704 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe PID 4808 wrote to memory of 1728 4808 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6888d7613b5647495321ce1167a0b19c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdad846f8,0x7ffcdad84708,0x7ffcdad847182⤵PID:1368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:1012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3628
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:2412
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3608
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,681527987612541357,13844061165332986771,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
614B
MD5bfcb36d6bc693c395eaf7206521fcb83
SHA135705bf274c7df2c6a144acfdb91fe01486dc8f8
SHA25690be6d737ecd73fed4cbe8a1fd9041b46ea0a52ceccdcf286dbcfea0e5fd38b3
SHA512840d0efa69dfc8c583486a334910ad0a4544fe4da7005911aada3a383933c2c5d6ca637adf3acbde0e31defbc18d095776363e3903591c488b2543053d191461
-
Filesize
5KB
MD56188e3f3f0b7d67fb9a7de3a501a2154
SHA195b40834738017500d74c619561ee215001e1e44
SHA256ee7b140b87be3001cb342d24bf63715781958971b6e9aed3e204809181befbbc
SHA512c940755df924c468d22504d580f9662c7a4bd520ba1929d00e88004551d98a51431dfd30ad0c67e6d893e28389df9ac9252f566a6c57ca35a95178f26ed991ce
-
Filesize
6KB
MD5c386b46e78cd3b168ad19f03e3072734
SHA1bb9ec0893c6195359549c2a6917a6192227104f1
SHA256b941ce96039de447c68a2fb4072d0e44be665c217d71aceeb238ea7363c53988
SHA512877cb6bacb82c2d53a64dc6a13416719022698ac38d228669a211710085e7e0a9215aca5a72da7e00255429f27ccff8813090c4c74fa29e000a5ec71226c6694
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD568cc1b13fe0e296a36ee42286343cebc
SHA1f965437d31721eef1dcf11651e427c0a8de2483b
SHA256451c51374c444be30a5851f48237ec109adeb3592f132cb8827fc072ae3258b6
SHA512d02c9bbb89419430b526da1c7249e84b948dc288b9b8008cd1aa1da6e2b3eea8cfbe29699001718b154f1d9091ec29beeeb4f60e98fcca211d01dd754031611a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e