Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
6925ba76b0f3f9760658d3ae67b52766_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6925ba76b0f3f9760658d3ae67b52766_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6925ba76b0f3f9760658d3ae67b52766_JaffaCakes118.html
-
Size
51KB
-
MD5
6925ba76b0f3f9760658d3ae67b52766
-
SHA1
584646982f8f2531aa786ce3d16b88fcfb0800ff
-
SHA256
10ffa92dd54ddc6197faa3f47a709e46e1f5a7df8f0f383e981d05d62c640538
-
SHA512
ba83bc35e3013dddb9acf648ff554d6a7cb0a12b74e35e676b35b956ea44922d56c5132e75f2d6e528fffa0aedbe16b1f15e246d8856b470cb4271b8e800ec7f
-
SSDEEP
1536:NPKPMXLPC0WtkP/7XETCIFE8qExX8kPP6XO7c:TW3UXZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4812 msedge.exe 4812 msedge.exe 3356 msedge.exe 3356 msedge.exe 4468 identity_helper.exe 4468 identity_helper.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3356 wrote to memory of 2012 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2012 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 2956 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 4812 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 4812 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe PID 3356 wrote to memory of 1412 3356 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6925ba76b0f3f9760658d3ae67b52766_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb042146f8,0x7ffb04214708,0x7ffb042147182⤵PID:2012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:5056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2752
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:3940
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4768
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:1672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4080972334384250004,4180436433001070294,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
386B
MD5eadd5a77bc0312861ec38fc154584105
SHA1a1da08c86c1b5bbbb14e37c9d3b0a7e391a64212
SHA25627a6a53ac626aeb37710313a4a7df3367a9c1a81f8d6bfdc3f8440bf78fb829a
SHA512d13264dcc1851fbde6745e8d6373d50053fb36700f0e3136e8018d9d496333e3d073264a298dac0043d85eb227effe3a8289c340a15cd396c212b52afab34632
-
Filesize
5KB
MD5e5c9d8682b55e3c3e7672a80277daaf3
SHA14fdf5e76416530895eb7771d2ff7c3ce21ab247c
SHA2568e23290efaaca87dc2ac4146f696eacf15139f6d3f06652ae3a8d3b6e8aeb193
SHA5123c0e7a60d8e3b7598668815d18773816a2df1b4b0281064ec31fec7e73494129065f83111fd174ec62ae60cbe1f0307b653226f8b7379e04ed618002e71d8819
-
Filesize
6KB
MD5a8ff7305566ef8fc0a143faff27be50a
SHA13e0cd39fe9b878bf9a3631d6a1bc98d7a535c63c
SHA2564ca60be6f58ab3bea291e42332b846dcdfb68577abd88a06015e2a4e8dfe4737
SHA512e812f75f9bf76320d65a9f615ac1f8594574054aff7109aee28668cd267681bad0f714a1e9932e0011913bf6bed83a93ffa9d4f8d7f5182ac50765d68a2d05f2
-
Filesize
6KB
MD5e4dc3459b25d741c9f666c4bc7af9279
SHA1a924202b37fc4c787706727652c4a807f51c3818
SHA2567369c1042cb5a6b0d8bdf6ac0d78ea51d221857df9e29b88415ecc400533b00d
SHA5123d9cdfec86e50819d7d27436522394a68bceebf0757c53218076f06d01938c20af930123b89be06e5e30d7d49fc97eaaf2788d150cbff699948c9dbc4fa02725
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f5c359c95c79702124c0406bc5d8f3bd
SHA11457df3975ab53f8506be78eabbd3abd25369ba0
SHA256e9659545963c09b0ccc53d014c6f7b82f2c1c105cfac988ee46c0f539656d336
SHA512bb77e5d3cd0952d2881234bd8014e240017b2aca3954576af27a6736aad86bd293e377ceaf556789ae2f5fc18d18d66d6f9ec1903548e6a33e6527d49b7ca8af
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e