Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
6a921d9d68b7e01c33762a6c175031c1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6a921d9d68b7e01c33762a6c175031c1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6a921d9d68b7e01c33762a6c175031c1_JaffaCakes118.html
-
Size
30KB
-
MD5
6a921d9d68b7e01c33762a6c175031c1
-
SHA1
cbedcf05e43c459bb59da934f1d7adffe8127c70
-
SHA256
5f2ba57ac09e065e806745ac2b3a608792cbbcaa539cbd7d5cea42b3bcc26f4b
-
SHA512
0574f508f55348a9e20fac417cf00174c45597fc3804e5940bd020488abae7bd0071e389314ccbffc49eedd9353e80073928527398c3a1b81a0c57202284f270
-
SSDEEP
192:uWflb5nvvnQjxn5Q/enQiedNn2DMnQOkEntagnQTbnhnQiMCZA06K+iibI3serwi:wQ/sDdn9Occa5zARvfKOY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 220 msedge.exe 220 msedge.exe 4348 identity_helper.exe 4348 identity_helper.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 3772 220 msedge.exe 83 PID 220 wrote to memory of 3772 220 msedge.exe 83 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2468 220 msedge.exe 84 PID 220 wrote to memory of 2648 220 msedge.exe 85 PID 220 wrote to memory of 2648 220 msedge.exe 85 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86 PID 220 wrote to memory of 4812 220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6a921d9d68b7e01c33762a6c175031c1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe931046f8,0x7ffe93104708,0x7ffe931047182⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14614093951822780439,9063689229902377153,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5c276eb12412f7fb29d746b1ba5cb8194
SHA11a92948d5787071ac2e289a8544fd1a13d1f94c8
SHA25653c16d8adc1544fe7f85e1a8b31ba1b9b460801b7932d0618a178c4f9aa7c18a
SHA51209a9280f78632b0c7343a5ae86440ce4436b52590a5a9fb956e18352f9b648aab08b6b3d3ee6240e78e78f0b3adf49660ee1dfac789814fc5e5e3de91e448a81
-
Filesize
6KB
MD57326a81192fe9934704929dda097a637
SHA1276f9d1e56630dfeb2e57aaca42a07d98108b891
SHA256aee7fc3f5d8fe3272a4bb422eb0af0822dd30dd5659b0ac531a221799cc7643d
SHA51208ff61af2515b63975e5ac6e9d5720541c82c31b1d82f4d6362f96654eaa795b88473f6e93f6e4162598d73a005f61a09fb2bfdb0af2df00930f88491e24dfc1
-
Filesize
6KB
MD5a28e73d5ffd8dc11c799e4ea1705371e
SHA1e4b0e72a75c6958d5d8182be3c77956698a015b8
SHA25660c908bd8555683b8ad5d2fdfb098dbdc1d4f8f08f9b33f26221ed458eb74064
SHA5125e04dba78b5c90bf7004d087ed3ad84f494404ff985cdea225e206d963c7aabc95481dd74ba9777497be847a5aff7e9e926b5d81399e54f14e4a99d63ccb167c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50b43d330b971141a6a134b3d02cd6a57
SHA10b740ce3836ace7b899a450bffe1017661c242cc
SHA256764fc903c5764e91a64c190d3c0ad231fb935d2d930a303dd396b79e42faf420
SHA512f64df1450488464063f8373241a4abc0d4c8f403639ff2028ed6c37b50b3bee89163da62e17c222b89a568f6ae29f1d68182678f28271048ac2448025a278b0e