Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
6899508a1c868bcf4a16bd8c08bf3a5a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6899508a1c868bcf4a16bd8c08bf3a5a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6899508a1c868bcf4a16bd8c08bf3a5a_JaffaCakes118.html
-
Size
11KB
-
MD5
6899508a1c868bcf4a16bd8c08bf3a5a
-
SHA1
eaaa3ebaea2763e56b09b8cc03a4c1469d437696
-
SHA256
6b41b3bf0d63735e27597828fe7ae7bbc57c60ad26b5fc46a060f2d9ae283168
-
SHA512
a1e176cd8d7337da16cb4a8c03736b0ab4a88499bf67b0c25d35fa32dc81cc302bb57866c8fe6d4e6f51942871f31c34643245f7d013e0507370d818e92fa119
-
SSDEEP
192:O1gFojL5E2HFKYnKppkb0hZVaY5SIVHUoy:iNETa0hb5SwHUoy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 740 msedge.exe 740 msedge.exe 4928 msedge.exe 4928 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 4928 msedge.exe 4928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4928 wrote to memory of 4820 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 4820 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 436 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 740 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 740 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe PID 4928 wrote to memory of 5024 4928 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6899508a1c868bcf4a16bd8c08bf3a5a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba87a46f8,0x7ffba87a4708,0x7ffba87a47182⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3151552007639106731,6379198295324307826,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,3151552007639106731,6379198295324307826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,3151552007639106731,6379198295324307826,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3151552007639106731,6379198295324307826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3151552007639106731,6379198295324307826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3151552007639106731,6379198295324307826,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD5cfaeea51adaab2bebeb6e7bdf3a990f3
SHA102c8f0328c670b8875308733c393edb97afdba27
SHA2562819221b1d5b793eb740503c8e348efea1642eb8a478d98bfdc6c3546cccaba7
SHA51209587a90354daa655f6ca0d38e8881c0313f7032b84d47c50d5cce1d18d4b610dbc2393d48ffc634473604e6be6c42b18079ed21555f66e09c3bb06eff2cfe49
-
Filesize
6KB
MD5452567298b5c0dde360dcc05c2491cf2
SHA1305005fdb96ba94351ed484741969947f9920060
SHA256b175f9f48d0f0b25fc3ff95f0366c7e509f6a1ead83a68ac2d221c774cc606c8
SHA512be40bcfbe0db4a3210e0bc10824e549024b4a02de8c4498412328b59f5de1c55b6740879591ca24c7146607e2628dd65d60c4a41234e62c2a81e226cab60618f
-
Filesize
11KB
MD5d9d5bc54d84ec3aef323dee5becd29d3
SHA166fe6f4d37f9d2ec1d5c981ab5e0ea48b6c12299
SHA2560cf389e4234804a60489e92520096b9674243886f1d483fed4e6c6aba5aa1edc
SHA5122c63e8ace5768ed3e4ec095d8c4e79f9f574dc76d68a99321c32a337193ade9e7b0e1a35aa6236c6e604a5b83109307bff00ce473fb7aeccbebd18d04917183d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e