Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
6c5ce2e54e8bdfe7eea53fd0c1cf3105_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6c5ce2e54e8bdfe7eea53fd0c1cf3105_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c5ce2e54e8bdfe7eea53fd0c1cf3105_JaffaCakes118.html
-
Size
223KB
-
MD5
6c5ce2e54e8bdfe7eea53fd0c1cf3105
-
SHA1
2099408656aa9c9b00f906450650d0b5e34476aa
-
SHA256
af93de3deff2acb621f4940cda82075ef4322ab6168647096d0e2154eec48b90
-
SHA512
bad5ad3a7d986292fb4818384a9a7f1cddf961745dc45fb439c1c3b21ae48c524faa9a628716fee7e3a8dce2d800177c3fe101f6382856ca342b86caf8a17bca
-
SSDEEP
3072:rt8ednBX+JpT4qX5XNJSvgEmSwLry8+pOVgdXqJKLpzFKcXN8g:OD3zbvLry8+pOVg5zFXN8g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 4484 msedge.exe 4484 msedge.exe 764 identity_helper.exe 764 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 3864 4484 msedge.exe 83 PID 4484 wrote to memory of 3864 4484 msedge.exe 83 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 5012 4484 msedge.exe 84 PID 4484 wrote to memory of 3756 4484 msedge.exe 85 PID 4484 wrote to memory of 3756 4484 msedge.exe 85 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86 PID 4484 wrote to memory of 3952 4484 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c5ce2e54e8bdfe7eea53fd0c1cf3105_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bed246f8,0x7ff8bed24708,0x7ff8bed247182⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9472963106271681136,1754345379793126792,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
686B
MD53afddbe478a2c008b9182df8449e5bc4
SHA106600104db0b05f1bb31ebc1ad98e67485a46553
SHA256985c2456ad06c3d11ad3efa74c5a408788d9027f1f7a75840ea230c833c512d7
SHA512778740635231b0c822c332f92c2e4d247b39e60a24a104b72f621af5da0659287ec71976625369d2aba3895e70d3dbd9118983a1ed18b5a5c5abdfd292921dfd
-
Filesize
5KB
MD51d65245ad8a9f6144fdb5367c0df5c73
SHA1dc46717790c0bbcaf12f09b111828971d3757036
SHA2565c60974354458087d06fcc9a31e45a18050a5bc4ddf17e5bc24ba8e55e1f0b9f
SHA5127ca65aeace5228f4a8ebb6a39991a33d6940e886397b972462a291debdde6f8d0c74a139e4f0e72f11aa819781fa56a50b501198a9bcb42290bf6f8674063a47
-
Filesize
6KB
MD5f5e5ea473aea6dbec45fa96241d3d86a
SHA1150f5e26630adf8283982a343352f88328c9db70
SHA256d445bad11d34fe01409451695f28f602a4aee7e877f77aeaf94f38d3979c47e5
SHA51286810c5cf7363cad358b5c0850f844edfd0aa1ed82ed9b21a821649066964c13aeccf129c8997b2e62b399d23273328fe626d780a7dad01403f41b1feb43589c
-
Filesize
6KB
MD52ed8817ff6817c735a786ee4c324db31
SHA1d874fd7ddd2c2f6cd58b038c0aaa10aed8c03d44
SHA2566063fad78061aaa35f50e83cc213e5993e3143c9d79eca45e47292ab8a51530f
SHA51234a4edd01116a6f3e70e4c4e3125e004dc6b0c83f80e3c2d4c550fa12c5ec8fe50798d0f4311b18e9b7991ea134e895d63865efec93ac233a86a78ab8bf9e706
-
Filesize
538B
MD5f23b6f08e9ea9715071e1a8a56991650
SHA12fa2f85b875d74d6ad242f1e542c807772ba0232
SHA2567d1c0397a67b3fb7a27e81ef38d8432444f3f12293d1e8e033512fcc765075cb
SHA51292fec939d623e3dc2b9ee014b690e96c3306e1b46688abac17a89cf3f5b53f6c3c4a7e92c1d2887c1056d966c1480786047012d8d568f6f41f5feaa863bab709
-
Filesize
203B
MD52ca23eb8f0872c2163b2a014714f85d4
SHA1be06f8496ff53a53df729121f0e31fdd45782088
SHA2569556ea0607c2def21593c8ade517951f238eb152bcaaf62a6e8a7150be52b30f
SHA5121fe6696303a6d85721ab680b3909fde2cd8c2261933276325cbe77589597acebf52d224071ffc0cedf6aa1cc3a52b87cc63292ea920736550bd540ac59a999b2
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5dc0833eeeb293ddaf9d205aab52db609
SHA119111b154bf582c87c96ea4c414db3676ab193b5
SHA2565b23c2e6b9445f6e801112f6fb8b4ae594331e9752f5b7c1c319f9b373e8b1ea
SHA51207edc6d9d458d20c283bd975f9b138c47b61d6bfe20a72596e6b4e4743a3ce1fa8417973917da069b5b6b198d68edb6e02bbad03328f40a135eaa4732e9c9457