Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
6a1b06f5b8b2ac611b49fca178499fac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6a1b06f5b8b2ac611b49fca178499fac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6a1b06f5b8b2ac611b49fca178499fac_JaffaCakes118.html
-
Size
64KB
-
MD5
6a1b06f5b8b2ac611b49fca178499fac
-
SHA1
cb8703c41ef599b47f4d49fefe17f93f6fc06b03
-
SHA256
5ed9c976c4028e8ab0a88cd6238c0d8353f058c1aafcb4faacc948cb2b1a2baa
-
SHA512
bc50c9eb8fe8738b55068542a4f97454f25b88cfbc780e02d33c74b1fb22332bbe56d32a3e9b0122cd73bdc2a25f27dc7aed936c8e3f79b251a1ac6321f1199d
-
SSDEEP
1536:xHXHEHT17To0FrD+zYWYc4qWuPt/1q6ILTbxBl5gF60re:xHXHqbrDoYWY7NuOLfgF60re
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 1020 msedge.exe 1020 msedge.exe 5012 identity_helper.exe 5012 identity_helper.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 3220 1020 msedge.exe 81 PID 1020 wrote to memory of 3220 1020 msedge.exe 81 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2492 1020 msedge.exe 82 PID 1020 wrote to memory of 2936 1020 msedge.exe 83 PID 1020 wrote to memory of 2936 1020 msedge.exe 83 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84 PID 1020 wrote to memory of 2992 1020 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6a1b06f5b8b2ac611b49fca178499fac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb2aa46f8,0x7ffbb2aa4708,0x7ffbb2aa47182⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2672208185228125661,16936566662447741019,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56f6664485281012c2c4a417383618b44
SHA137b61946fc1929d55c5b8637f45f22118a328034
SHA25639a772abbbf589da21c981a1dda14bd7f0b8ea91a12f2cc925685a8d86b1a4ba
SHA512d4779195db019af339b12fa197b68c2abc0596ac16c9ee27ba772387bdba915f1115b68f2cef955b447df4d17afeaab76e96698d3367bccf2d094d51e950b2a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56d0da96bbaf5a1ee1eab590fe19cc486
SHA1f0db53601df4f58d9d94516a1a68b89983322e4a
SHA2562c749a1372545e5addbcd73a5827cffb1553067e8384ed352b7f05373c74b30a
SHA5128b9fd25402b187d8e7c80c627a7f3833ee3ba56987c1302068e73c7502eb0c8e949b33ec7d727040b1ab3feaa346cf631a56882a086cc4ba354c2dc976c9fccb
-
Filesize
2KB
MD5f6d69763d6f690436aabc6ebb7efc571
SHA160c8d2e39d82e252d2b153b80b6544bf33cc273a
SHA256efafe21a506e48ae952731b5575a44d5ee842fc6b2d273ff5a743a667c8ce4fc
SHA512e8af02e9ee2f6bf4f79dd0c4a6636b80e83305ce866c996708e71b17123a5c5fcebc451b2d712b477cd99c89043e52a68f45128792e924bc6ca675809fdfe7f1
-
Filesize
5KB
MD526f425f95a43c7638a21e7ebdc5a3436
SHA1652849a411bc1362089e0c81aae7d6aac329d312
SHA256631edca09cc1b1b8838fc97ef48382c7574abef1f00f5a90e9f327d02882553d
SHA512ef50c696cdcc3d91265ea864709727a2155a82bd925ecfa4406c488690d91c7909939f94a34ccc49546c12610dbe685744d1e5ae4bb9df0eab26747a12d1b4ef
-
Filesize
6KB
MD5f340dab3be794a14ddca78724be5f928
SHA16336f682907320a2c831b9acef420ced207fea4a
SHA2560114bb1aad2cbb60ce547fb3ad5420fcc1521e5b7acf2dee711fa386485a5d5f
SHA51233c3eb86328c51c8ad6857100c6be4625db3b3446d0d09199a4580197b4d9da319e0ba8e15a5b733dfa7e518c948f2cf60f307a252b780cf0b6b8184b88e44ca
-
Filesize
6KB
MD5fd118d4b17f4b23f39641041cdf97495
SHA1c1215036c22f93c95c8753514e2698460cbe07c6
SHA25637f2a028828289ed89823eb8a7f2c4877a93ac1c9261a65ebbef88d69242477e
SHA5129ad031c46ab0c0e38f163aa05dcb2795c22575d6f586c7e2125fe9cf48199a91b6a81e505d40bf3e00e697633f83305ee084a88d38ac58c576afb1d16eb7ad4b
-
Filesize
6KB
MD554f09a95e80d45c54fda856bacf623a8
SHA1a477fe15f9b2f2a0ad383a131202946bc850755c
SHA256e82ed6d550fee8ae123fe6f61f9965491205c9d66dedfb3a4140f0962480d181
SHA512265023c11501f06dc9c6b32e8886123fa799366d108f7a0209955d5a4c492983fd3cfc9276d5b83aab8f6bfd2b6b0e275b9542f92f94e9919e77bc3f1ce55fcc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d072e0d19ea412d847064a0c82ff76b8
SHA18bbc04d8f242b174f74be54f581e23eef7d7c52e
SHA256b38c75c3ead559e9bee1f90a25f1aaa97e60aa3dd3dc715dc370cc1b2e62311e
SHA51214e5a19bcb33491b100e26901484197599eadd165b7dfa0b76a52ec6c93945352c5bbec4c09cf301c74cc584d13a1f2fb5573fd8be8825d3ff766315a1a4cb2b