Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
6c6c341f0602c6c329decd331bd87eab_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6c6c341f0602c6c329decd331bd87eab_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6c6c341f0602c6c329decd331bd87eab_JaffaCakes118.html
-
Size
34KB
-
MD5
6c6c341f0602c6c329decd331bd87eab
-
SHA1
bf824bdb8013c3c8cd88120cd62afcbd37cca38b
-
SHA256
53b78b64057a5352554b45f28b3305653ff3eb9d8361d48e08e41cf38f2e09f6
-
SHA512
d6d2945daf2f801edd42f7644cfb2bcaaf79710ac7d5acb635e1f32c6ea14ee4351a10e9e834f1b5c7096d4e129c874ed9fc9af091369a45f9f5b809081052ca
-
SSDEEP
192:uwbfb5nRGnQjxn5Q/MnQieXNnXnQOkEntASnQTbnBnQOgecwqYjcwqYLcwqYQvhp:rQ/kqfJ5vhxYdjoCePhb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 4696 msedge.exe 4696 msedge.exe 2504 identity_helper.exe 2504 identity_helper.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 1508 4696 msedge.exe 85 PID 4696 wrote to memory of 1508 4696 msedge.exe 85 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 4708 4696 msedge.exe 86 PID 4696 wrote to memory of 1616 4696 msedge.exe 87 PID 4696 wrote to memory of 1616 4696 msedge.exe 87 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88 PID 4696 wrote to memory of 3608 4696 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c6c341f0602c6c329decd331bd87eab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffc63f746f8,0x7ffc63f74708,0x7ffc63f747182⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1392 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,12252390733771585448,15360401194167204130,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD55593bf94e8cfd29a35901b69da303284
SHA1f68cbe3fa36d4cf805ecbcf20d0a1acd8a63e4fe
SHA256df0f2bed7195382b73d49d484fe87d6558fce00d6f9eabff8252f0eb1fb825b6
SHA512fe43a9abb18bb08f93e49ab2eabfcc00b678a62b07eb416393a542414d75f5ae8f4c423e97b70f1bde7627795e937570a3d131314001672ba909f7a53e682de2
-
Filesize
6KB
MD5b37a04b1b9bcc9a865c19d12bf5858c0
SHA163f246d0fbf1914a4e7ddf8dc6341d87b5ca323e
SHA256fe5f99722927f0db17628431b45902580ecf3139bc4deb0a94e8bbb4348a5ccd
SHA512af40b9c5a7c827c5a8b0021f30e314025ebe51ada6380a6772dd9799acf4019d470ef8e1fc996f1a758dc112e412b04cb62e78dfc58287ba7394ffbc7767af43
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a899907e28697b4f6d2583a939c8a690
SHA136bc0df1faa236b085dc9252ec483cc675de6432
SHA25645d3468c22da569b5e1894cb167b111d13314b077405dfded29b0113ce3104c2
SHA51229bf20e5f35229eb0229bfe5a4e81b733b863f7472c55fb6fd08fc8dcf46024e03e6f619d557668435a7f40d903bc13d44209e0adb496c0d265202f0860bd13b