Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
6896e503690248559d8637e74e27efe3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6896e503690248559d8637e74e27efe3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6896e503690248559d8637e74e27efe3_JaffaCakes118.html
-
Size
220KB
-
MD5
6896e503690248559d8637e74e27efe3
-
SHA1
3b58ebf4bacb5127c4572d4e4dd1b6ccfc3303d7
-
SHA256
0ac2ca2045e756a1e3fc7b505c76a31f66f65a4310fe22465f9e37142df662b1
-
SHA512
0346332de32fab36e5ef4fdc69d1cd457b9c52b6bd8c416551a90a57e9765ad0c9111e8d0813bcc694af7f46bbeb8aadf0b5eb63eda71e8d2f5698f088a06a7f
-
SSDEEP
1536:L2KD8JJK3lvLyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:LJ+KyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 5008 msedge.exe 5008 msedge.exe 1680 msedge.exe 1680 msedge.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 1680 msedge.exe 1680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1680 wrote to memory of 1868 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1868 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 2548 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 5008 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 5008 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe PID 1680 wrote to memory of 1412 1680 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6896e503690248559d8637e74e27efe3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6f0146f8,0x7ffc6f014708,0x7ffc6f0147182⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,1536008360144596800,14841202778039776456,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:22⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2280,1536008360144596800,14841202778039776456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2280,1536008360144596800,14841202778039776456,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,1536008360144596800,14841202778039776456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,1536008360144596800,14841202778039776456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,1536008360144596800,14841202778039776456,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
182B
MD56477f21b1d30ee6a60014dca027dbaa0
SHA1e1f5515b0a7d8b4aea80456373bab4489d554541
SHA2562a22eb953586bae5f52317823ed1d6e07ce5a8293cfb34ec11994c920481e99c
SHA5126268ca735dec7bf3ede56450313dd78e3ba74b9b6f1f0778e1fd2b2181e321cf0b4c6e46c4c9a43104b20d055d875cc63224b0694645faf3527cd018ffc47827
-
Filesize
5KB
MD5ab0b597c7c132d51be01fbd4c0ee1c61
SHA1df67a38e54b5185ee1f7dde5dd8ef058f3137efb
SHA256b68236ad43295d01cd19bfbc41fe5e9906f41cf2850ccb2b161330f7d65f51b4
SHA512a8f09f7181cebec7c454be727709464cb56e10ba0dbafaabe5ecc893bed3871b966a0527d28f54b83bd9419c1e321ad190c5f05551c28bcfa768a93560a97395
-
Filesize
6KB
MD5ee01c569f6bc4f7ec7ce470f37a82b06
SHA1a63a89adf332c957ae7d8b9024b5a5c466b23a9d
SHA256f60ec2eadedd503b7e225a8dbe4264d42cd057b17cb616d6dfa9438e63de38df
SHA5126724ac5acdc4ee0f7dccb2e07f75f7e3b36c7ba33ba3783be83b9c18e69650b35c1ee4fb87f9ac17e52fb4f851f10eff22f99d3dd68efc2d6a0a0aedcbbee939
-
Filesize
6KB
MD58a2507e016952ddc1a4f7e6ae33f68f8
SHA11ca49acd5c0167fb8e94708e198dbb5b262bad0f
SHA256c7ffe7ccecc25f3a18421bb4e82abbf340579b0ae8eb4c9fc7932eb5001cf5df
SHA5122be04e15f529aafd8c5a89cecc8fd4b3c4adb10dc30e9dec4096ca951d83452f311f83fefc02a81ef884e4cd9c73f89af05d48d21982c7c76694dc6d85d5ee3a
-
Filesize
11KB
MD5e352abe70117fe76803db0f73c10316a
SHA15ac71ff0ccf8b67f350e0caaac4dc713c9bafb9f
SHA256587177d09020d5991637d639d667965e1f4d989af7ee9a70af319935e9d859d9
SHA512576d6a4b4399f44a71ecdd59c0a809f19e7d37b77fcc7bed091e4edd68da7de5d9af470e86df15de37fbe9eb3d6ab2689ab3ab53c596a9d5d99f31696917ab82
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e