Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
6989a99c24339dd91d2daca8d2ee67a8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6989a99c24339dd91d2daca8d2ee67a8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6989a99c24339dd91d2daca8d2ee67a8_JaffaCakes118.html
-
Size
67KB
-
MD5
6989a99c24339dd91d2daca8d2ee67a8
-
SHA1
cb7574227dabf87dd0746b1ff658b1ff47951d8f
-
SHA256
7a308d8691edca5cbddbf3807c78d109cafa1f7251e13ad9d8e5cd61ce9cefc8
-
SHA512
9e3bcc678040f68693c3072aa1e7d8cf6c869679db01cf1ff323a966b5bdfd4a3fcdde7fd84a58c8e61c76fffc084f9450d3e05ed87b0ff75629d2b8ab15f08e
-
SSDEEP
1536:JfeWICuYoCuYTHNCCKVCuY5TePec0tbrga6cuNnzIjv:JUCuYoCuYTHNCCKVCuY5TePRtcuZzY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 2660 msedge.exe 2660 msedge.exe 4328 identity_helper.exe 4328 identity_helper.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 3196 2660 msedge.exe 83 PID 2660 wrote to memory of 3196 2660 msedge.exe 83 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4356 2660 msedge.exe 84 PID 2660 wrote to memory of 4456 2660 msedge.exe 85 PID 2660 wrote to memory of 4456 2660 msedge.exe 85 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86 PID 2660 wrote to memory of 2108 2660 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6989a99c24339dd91d2daca8d2ee67a8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffffab46f8,0x7fffffab4708,0x7fffffab47182⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,10898596655812711168,16570676535747961103,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD51c8895783e0106ef3f68be833fd25f62
SHA15948ce9d24a83faed7233857efdecdf3d9bd94bb
SHA256759feadd85b3ada9ec91729cffa189f5a7c600a332dfee775e789fdd408c8f78
SHA5122a5440afcf06dfbb3b764c781ce2e6c203984aad986e22dc5c15df15eaeae41a4a6f37855a509e282bc0beb60f696d793937940e655554414b5b1b084c87e6d4
-
Filesize
5KB
MD5057f7faa4e8cdd54af523cea96524e6d
SHA168ec49c5508a35d0a5ee6805ac84cf411dd15bbe
SHA25669da9dbd812e51e804f2a6d6d9a1e69dc20308b527a29a51ddc02058f9069b38
SHA5127c12fae0c9f0cf3737ef3651afaaeefa7f6bbcaf9c2b32d4e43ba73d83777a0f916b3624a8b632cc9e1b7f3a2ceff362fa56196260252ffa9cd3b5ace62aa400
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e51261a414b00ad13d75ec9b94da2fc4
SHA12fd018029e8cc87eb951cb61f153a6be4f3fdb02
SHA2565948c31a61ad85dbcd6da38e22de1ca621c55db85f3a38d0ae2bc6211ea57fd2
SHA512b9fe68f1c6f29bbaa61bd5e7e0c214be035b27bdd008d3c336ab6b8661b5da0974688ac6ed5748c6ef9c9b97ea5338f3d7df620bfc2858c786b7ff7ffb3e041f