Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 06:42
Static task
static1
Behavioral task
behavioral1
Sample
6a12a2a5552ab312d74e542b57cdf949_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6a12a2a5552ab312d74e542b57cdf949_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6a12a2a5552ab312d74e542b57cdf949_JaffaCakes118.html
-
Size
194KB
-
MD5
6a12a2a5552ab312d74e542b57cdf949
-
SHA1
f767bd47722b13488e7ffe92c5d6066e4fb2ca6d
-
SHA256
6a4372ab8378eea81aeecd5ffe8b49e04f00b2da6540eeab84bb64592ea79b88
-
SHA512
0df34039d9b84a1c377479929215f27f12641671ef424d011f3135cd4d1a092cf5537dbc0f154867a409f268c8c8d25acbf23c81d5dd46e8031d05cb696618cf
-
SSDEEP
3072:SXWoWcyfkMY+BES09JXAnyrZalI+Ye47uM9f7UL:SmoWBsMYod+X3oI+Ye4pf7UL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4512 msedge.exe 4512 msedge.exe 4200 msedge.exe 4200 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 4200 msedge.exe 4200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4200 wrote to memory of 3228 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 3228 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 1124 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4512 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4512 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe PID 4200 wrote to memory of 4120 4200 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6a12a2a5552ab312d74e542b57cdf949_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9849246f8,0x7ff984924708,0x7ff9849247182⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,4937139071981654439,10305281484278828723,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,4937139071981654439,10305281484278828723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,4937139071981654439,10305281484278828723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4937139071981654439,10305281484278828723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4937139071981654439,10305281484278828723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,4937139071981654439,10305281484278828723,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5e7e333bf74f5e69571660564efe96778
SHA18e2ed03f81c80d1ddccb1a31cb428f42da6b84a8
SHA25684c492598d602924c507fea125efe972f33c585211adecbf350b6a41f50c6ad6
SHA5120f5b1905efce6e58c363d576f3e88346982e606513356cfe444d70efb03c66ad20cbaa74b2c3cb74b0ed376549209e7223bcb49de0009b7cd345c3f049d4760a
-
Filesize
6KB
MD509803d667e01413e93c79f4bd4f290bf
SHA192d51cbd76e2ccabf31fbc6b796a8b7b81be4b5a
SHA256a55722bde3b381c8e3d3b4429124d8441152264ac5005cc4404c3071ddfd76b1
SHA5121e1655316f4ed0df334128e074bd3a873385bd12f2e5b084fc516e71a7d5e9dd4f1ded098124a2ac686c08fb8fbcfd51986011c34af79d27006aaaaf8308d7d3
-
Filesize
11KB
MD5fc7f500bfa71d59aab2703b7c7843e14
SHA1f8592af4c64f68b0284526ad068fff2af0a1c08f
SHA256522a7f227b4bb82a49df078f5d3ab53569d5bf34b18acd45938148d0a2bad4da
SHA5122aec925d53568e880f429cacacc5ed72c6fff093e0f68e48d65266b0bee4c09cb0f25be64854a495179ee3f835c3564395baafc9124b751126c0ff9744b4caea
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e