Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
6b046fcaaa3ff253397a23d610cec07e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6b046fcaaa3ff253397a23d610cec07e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b046fcaaa3ff253397a23d610cec07e_JaffaCakes118.html
-
Size
462KB
-
MD5
6b046fcaaa3ff253397a23d610cec07e
-
SHA1
03fd94d377ba0fcef024d640abcf97b4ec0d64cb
-
SHA256
2e77693e07299825f301d96d766db98d13c77c0e34d17b3d54ff22dcb35b55b1
-
SHA512
9507d209958871faa9534ce4a318474e08f69de0b6ce0be225969fa554e7be7543b0d5badcb0edd1a521f819cad2948cf6a48492096d3750a194b6161936658c
-
SSDEEP
6144:S7sMYod+X3oI+Ya4sMYod+X3oI+YBsMYod+X3oI+YzsMYod+X3oI+YQ:u5d+X335d+X3n5d+X3F5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 3252 msedge.exe 3252 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 2004 3252 msedge.exe 84 PID 3252 wrote to memory of 2004 3252 msedge.exe 84 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1428 3252 msedge.exe 85 PID 3252 wrote to memory of 1556 3252 msedge.exe 86 PID 3252 wrote to memory of 1556 3252 msedge.exe 86 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87 PID 3252 wrote to memory of 1192 3252 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6b046fcaaa3ff253397a23d610cec07e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f40f46f8,0x7ff8f40f4708,0x7ff8f40f47182⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12507450936001369988,4562126678730050977,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,12507450936001369988,4562126678730050977,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,12507450936001369988,4562126678730050977,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12507450936001369988,4562126678730050977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12507450936001369988,4562126678730050977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12507450936001369988,4562126678730050977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12507450936001369988,4562126678730050977,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5d63906de8998f8cf0736927b62e26272
SHA1b6dffd2629b6e6a9bdb3d7cfbc370bee3a602333
SHA25641c9fafaf95e90e92222e01cfeb94f8d889a5ebfccd173ae984f756ef43a7995
SHA51225168ee79cf1539b59549d275fe80cadb604a935cbc6ab90317e2ffa2aa9130386acca014fd0c9b0c678602a603ecdf8d9e4b257b397cc75659e9478f07af859
-
Filesize
5KB
MD51df5972d64f5d7b4f4c2d931c3e82b49
SHA1d37e3325fe56f9ce7fe4410f78d8549976021ac8
SHA2563c85aa1614b5125f95430029f91c8346a4f177c40ae1c38a6b82b6b70f3fee3e
SHA512bb0523c8a8bebead4f9e45cb44bc8d3a9fd2aef9f61151e360d818b555820f551ad6a6689357ff5eb7b42bd306ab67946fb80813854a0b539dfe5e341a0a8c45
-
Filesize
6KB
MD51087a8bf303fb303e2ac96d8dd1ca94b
SHA15fdd915f0e1b71a95fe2df5eb026f15dcf1ed29d
SHA256b3eb5c1b1036c82cd707077db93b27ed1027829f04e8f312179e0d51e3730904
SHA512b77e281bdd897702e85d5caa089a0375ab058840f5c6297604ec35ec90a51272d41a336af309a3f15697d56f73dd631841d703aba9ca7df499f5dfdf7175cfbf
-
Filesize
11KB
MD5bb02892450f807907d488204c58ff6f9
SHA1520071dcd699e7ef8ba029a4f96aaaa6ae2bbe48
SHA25691a67f7c011aaffb40a2203cc57de28ba11d1f149628d28107ba0c195840de5f
SHA512a5ff3b08928ca51b49bfa45f7be62294fe5460640d0d2393ed42ed85c4eb5f94d36b8cc905c1fbbee16d4cd7ad516e523d909c081390f7f7a42164edee6fee6f