Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
6c9a189fdbe421b32e599920399e6d5a_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6c9a189fdbe421b32e599920399e6d5a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c9a189fdbe421b32e599920399e6d5a_JaffaCakes118.html
-
Size
28KB
-
MD5
6c9a189fdbe421b32e599920399e6d5a
-
SHA1
7f39b8cfb201aa56a462b7feea97adc6158ec73c
-
SHA256
2a82cfc589cb57a9f0341ef3c32c0e9bcfa7fcac9f78d2c72528598d4e62ee1d
-
SHA512
3a4a43127d8503fcdf7d6c8172d2fd4510a344d4df98c497506c8618120b6c3125dcb22d747cd4f4f75a2976c1cf4beae9677f56cfd6e1079f3e0fe5ce3df917
-
SSDEEP
768:1Xzvw+B/xGqnXnaCnnqq9701Ob6VwOqFntUmn0j7sq:hzvw+CqnXnaCnnqk0DqFn47sq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 2944 msedge.exe 2944 msedge.exe 408 identity_helper.exe 408 identity_helper.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3564 2944 msedge.exe 83 PID 2944 wrote to memory of 3564 2944 msedge.exe 83 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 2764 2944 msedge.exe 84 PID 2944 wrote to memory of 4900 2944 msedge.exe 85 PID 2944 wrote to memory of 4900 2944 msedge.exe 85 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86 PID 2944 wrote to memory of 948 2944 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c9a189fdbe421b32e599920399e6d5a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80fb846f8,0x7ff80fb84708,0x7ff80fb847182⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,10248382763220768784,9733074332667706156,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD5d9136cd513bf6c7248f54f32f2d316ab
SHA1cf26cdd0b2737ee60b6a183bc990c42997702c8f
SHA2563405e622d34fe6777ea3d7c512a41b55446427534490961265b7f84cb41bfb50
SHA5124043e7e950de4c1cdebc5322862e6b9972c718d36b54d26d34628f6f27a7f0549bb744e0f459e805368bf76b0f488e10d8724435262ac1db2c6edd79d208f088
-
Filesize
5KB
MD566516f8c0203d5368f028dea8e1a28cb
SHA1afe26b40ad0e70f88c6c8287d3d9dae8e8431b58
SHA256afb9f60b79107f7891f6bccd5acedc0ee1cab17783ee9d575742947a6e678064
SHA512cb6cdf7e856cc737acc063c7d29f452ca02b67682229f1924bce7efa38345b53196c3693298f8db76fce4bfdc435acac45c291ae284b0fff5b4e9a86149dbcd0
-
Filesize
6KB
MD5464e5174025c6419516cf91adbfc7dd7
SHA112d150a6e693c707dd7d09e1928d891544cafd72
SHA25629fd8b1951f1e7ba30c50acfd893ffa6ee97ba4f70ff9822ec06bd0951cb971c
SHA512fe5026f3e5b441bea1c3206b80f8db92a7c7f1bef8d22a5addcceea9265fe60c00d5c0b421f1acec747e696113a2df96d5d238ee97e651776bf1cceb7d51a046
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58ca6b7d1dd11b4416d363c99fcb2ebb9
SHA13228625f9a358f45f37de7e51c39c595c99b93c7
SHA256b88a59558e155b7f37b2e3a0c5df65eb54f183583523b4a1ea70df422cf11f44
SHA512b2fb946b01e54531e050250655bd1eb7e998a818ca4f6b2b8869f67b9a72c915e747dd1734ba001044b63a4af4341a7d508ca4e35a5e4822cb6e816725699ba8