Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
6c811baf93258d9858ecfa0c6ab94934_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6c811baf93258d9858ecfa0c6ab94934_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6c811baf93258d9858ecfa0c6ab94934_JaffaCakes118.html
-
Size
23KB
-
MD5
6c811baf93258d9858ecfa0c6ab94934
-
SHA1
4b3510fd4c09b57b5fc6207bb0349f476974f4e2
-
SHA256
36748b049d6b543fd00d5b69e972a8afe8e6b99220b04903bdf6353c7035a843
-
SHA512
677d352697eb10bc7726eb393ae6b2b04449f06e1f397f1f853dbf1af2c68ce2734ff5ae2c8bda91da0fc9ba2d7558256692b0200cb1118f892efac3226c5545
-
SSDEEP
384:StyAkQCKrqvqC92aqtGwnmSa3IT+Vpv0Qa6EvftedoMfxcGbu/D4cmWe0x+wlq0t:StyAjFWvqC92XtfmSa3IT+Vhh7E4nxc7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 1360 msedge.exe 1360 msedge.exe 4768 identity_helper.exe 4768 identity_helper.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1256 1360 msedge.exe 83 PID 1360 wrote to memory of 1256 1360 msedge.exe 83 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 4588 1360 msedge.exe 84 PID 1360 wrote to memory of 2172 1360 msedge.exe 85 PID 1360 wrote to memory of 2172 1360 msedge.exe 85 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86 PID 1360 wrote to memory of 3520 1360 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c811baf93258d9858ecfa0c6ab94934_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc374346f8,0x7ffc37434708,0x7ffc374347182⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16652470507436396299,8584176644798977704,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5c652cfcb9a5ecf7cc55a59078dae86fd
SHA12b8944580f327ee58f53d7b61adce434fd9be917
SHA256e8196c2c8a6ebb9717fb7a9264ec061f9377cb901067339537bbc1c48c882a76
SHA5125d39702515a3e2525204b8e75f51bbb3b5c82f3ee712973c88816e827b203fd8a64c5f9d144f90ff5860b94f1974e48232cda0fd2935e8ccda89c5b8969e3c1e
-
Filesize
183B
MD55c1019a2fbbae64fc4028cb6454df74d
SHA1d20fe68f9ce22bfa8c0b745a9766ece9609b58ea
SHA256ff935fcbc416876bcd99dbdb408a834913432c5a18f17d8586f5301874ac6a75
SHA5129eda61ceb453cf16e4aa8654fc73223f4c1c10fcbcc4459449fb4da3d21b452b7c81ca1a3f1a633c18d21894c3e902ea1ed1ab27a4ce2583c28b5ad0562ff48f
-
Filesize
5KB
MD5fcf6aa64fb4746ec7b695af10237cc22
SHA1951ed96f4f48d9eb7543e5c627d77114575f6d56
SHA2565435137ebe08b5447b80eb7b871d767c790a9c5cc13fb8eaa26334bd99625f54
SHA512d7ebd0871ac0a48aa2f619e8b67a4bf0665badbcbc9a94364587b6836b1fac8f69dd35926653061ad675dfd07b8af628e9a9e4e00cf3e35c6de7bc8f7649ad6c
-
Filesize
6KB
MD57fcb3985bd42b34315e52864adeee582
SHA1a8bafcb25d968338c81b194138711f698275e729
SHA25623a777f953f766a30dee42666dfb988f2c0476ee3a769bc4c5feaca0c3c34ee5
SHA51279b1eef7bbc91a0566e66656f6314ae016811ba60652c6869553a99d2e14b6302ba19514ccbb591c7d11c57de4deb3dd83ea304b3fcf724b834fc9e0d1eeb272
-
Filesize
6KB
MD51893d43ba08d2468c8badd7f78263b97
SHA1e01ccc363dd9cc57b04b0689e9e1a784f8d37129
SHA2564400ac10e9a0531167dd52d2f5eb09c5851f06d07cf4f0a06a5d53b65e396d21
SHA5125faf2b0a8be88af79e67bb9ab1fa07464b7ebd1b93884cf8c3b5696dda9e709cbef47ab541278c514af66f679cb801bbf52bc6632fb203c52ee04b411d742cba
-
Filesize
537B
MD5a0c6a6fc7e03dae74ddca15b77fc1ce4
SHA1b5f3a300fa351daa50fcd71ca368ecd69f6bd9d6
SHA256afc913dfc41e8ebbbfdd712ba06efa4c161a42c2242280e03832c6e16bff7f4d
SHA5122ed077562a5d0803bf9e48b06bc5a47ea3b0fd63f3fc1ff0c568e7fa388430880d4069608fe46658c45bf3a02850b07116734a247a58b44df5e722443ee1c335
-
Filesize
537B
MD5b6e3fad486842e77ce56deaaedcbf1dc
SHA1e13c9bd931390868160365b5f15eabc06633f4da
SHA256e5e2b198d8b7c5979a41caab95f089b102103cc7110a6533c4aeae616c604b85
SHA512ffc50a8de6f102a12d4e948820d9f7e3cae4611fa78714e6dda5cbc57c69f028a22ae07e26181f6deb1152640440245bb98a220a0c5b806672cedcdb8b096629
-
Filesize
203B
MD5713089f0b362dbb5c75a8d9d40206162
SHA1636f9dae59d2d8990c6ef71025d79aace3760606
SHA256e6e7e0c6b50521ed2c70ddc53735b7c33ee0d0e14210a843a9fa774065941fb6
SHA512cda2043b35e37e083ff2e876313448ea008fd99fabdf0e0c30c0d4b7af25ea9cf8ad04b332d4a0e29a6ff7f59e4496d94652985c2d9d91356e43a37d6d714bec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD573c3622681c000a600da309a4471aaba
SHA1c32872242a95d8fdf6f649c6a721cf9c8442522e
SHA256eed4722b904d07c1434e4c1ac647a15fac999b2658fdd36602483ec681bb60cb
SHA51244eb1c19dd61a42026b3920780abbef3f0ec3465f7dee68517d966b25b52bc839ae2f7ebfcbe4894c14a41503c5fb5583370d4c7a3d9abcab9745e06ccdf9aa9