Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
6a8600f21854b395290b040cb533a342_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6a8600f21854b395290b040cb533a342_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6a8600f21854b395290b040cb533a342_JaffaCakes118.html
-
Size
139KB
-
MD5
6a8600f21854b395290b040cb533a342
-
SHA1
1cbb740830269ea27085b9a271b4d74a52608a5f
-
SHA256
60db14c5a59180d7a615e9789d1a8605ad54dcee59e4206137d4c9d322b36158
-
SHA512
b7b22c0117310dbc763885590c14c4febf31f66667ab0ee34f029e767526bd4230474ab0db2699fff5aacb85a3c623d75ff54f647eb859b0266b6dee284c9b02
-
SSDEEP
3072:SUg5KnaNRSqk+hyfkMY+BES09JXAnyrZalI+YQ:SXKbsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4684 msedge.exe 4684 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 1292 4684 msedge.exe 83 PID 4684 wrote to memory of 1292 4684 msedge.exe 83 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 1312 4684 msedge.exe 84 PID 4684 wrote to memory of 4948 4684 msedge.exe 85 PID 4684 wrote to memory of 4948 4684 msedge.exe 85 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86 PID 4684 wrote to memory of 2712 4684 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6a8600f21854b395290b040cb533a342_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa84ef46f8,0x7ffa84ef4708,0x7ffa84ef47182⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2512706877783995590,686280018996266523,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2512706877783995590,686280018996266523,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2512706877783995590,686280018996266523,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2512706877783995590,686280018996266523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2512706877783995590,686280018996266523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2512706877783995590,686280018996266523,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5a5938324fc2491be5d08ba625dab73f5
SHA1f00d1d5f00c068854a416389d7be35008f6f32a4
SHA25665c4cba75c88fe59f0f5c0b34db38bb66f4dbaad7ad6f3feb57e1806a83fbc7e
SHA51230c6a55cf4d94424651164dcac7a3b1acf408c20f58d541f4378d0bc1887946903689fcb0125660c608ea0c1e6ea376d8516a1d5d9760d38df7624d6d6d5040d
-
Filesize
6KB
MD5290eaca7392ce28c814e35d038b7c550
SHA142e8401521258b6e232782f5e1b53d125302d84d
SHA25659dabfefc9f00064e8a88571e5314e6937cbabcd18d240997da2266adcdb2226
SHA51230652eef7082c67ac3afcfd723a37d6aa2d310236f0314d6e020d35abbd66a11825f84d0289becf4b8969366a110a0cd59ff6fe47deee4e13a9173183a9b4d96
-
Filesize
11KB
MD59820eae9946f6ac0d83b052ccce1e677
SHA13c32a4494fbe21ad0ddecb5d7cda3a95755d30d4
SHA256f6fc34847d6f1eddad7e2a99558d25d5b21b5f812a260d2cafcd40f06addcdd4
SHA512224043cd6d1339b8f3f38dd96bf1b114285ca0c2420d7c3af33a98328be2d8485c44526e5ed3725a73379528cb8264570ea3c718236b4eec23cb5444617a09dc