Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
6b8fef61703feb31adb3169bc9e220b7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b8fef61703feb31adb3169bc9e220b7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b8fef61703feb31adb3169bc9e220b7_JaffaCakes118.html
-
Size
100KB
-
MD5
6b8fef61703feb31adb3169bc9e220b7
-
SHA1
51bcb6bdcf4686ecdf144ed0081419e34da381fb
-
SHA256
c564672070266f87215ec6689aa494114a135b57024933306717377b14aee160
-
SHA512
469f3a784b13aa7bb30ab2661c3fd1ee7eeb467b28635081028e3867fde35e032a40ce13e86a8336a3ac909a5886253e05c9599e8926911d17956f790cc18764
-
SSDEEP
3072:B71vjFiWkkViy8miHRKtlSTxvJWqEqhqntqFqg6RqyqC2/zRdqdQW+DEk4lv6RVJ:3WfQLXeL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 4912 msedge.exe 4912 msedge.exe 4920 identity_helper.exe 4920 identity_helper.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4356 4912 msedge.exe 82 PID 4912 wrote to memory of 4356 4912 msedge.exe 82 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2236 4912 msedge.exe 83 PID 4912 wrote to memory of 2940 4912 msedge.exe 84 PID 4912 wrote to memory of 2940 4912 msedge.exe 84 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85 PID 4912 wrote to memory of 548 4912 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6b8fef61703feb31adb3169bc9e220b7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4384252100742195986,12436165851525057727,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2da015aa-df7a-4f9a-a148-53d099309232.tmp
Filesize512B
MD59e384f24e0dbed27a99a160315820a79
SHA151e1774bce2de88afa13c8e480cb33c0f098a1d1
SHA2565199397816465914f613e343b3a0ed1dee2141d4a0ee4b7d01b25653ab8cf80a
SHA512d5a3e97c0ae7f5fd6ccf8d2d08e19d60a3e2c784838cb0859447c42f34e7af43970e0ae55c537a4e65f9260bca090c7385226f2353b6bfc43b9df4ba2caa05f2
-
Filesize
5KB
MD5c095326f6c3186a5f0687dafaef3bed4
SHA1c78ca09b91cd56419e1d20abf41cd04f301ce44f
SHA2568bc223f8e96b7bf5928cffc401b104d7d00b18d69074bf19d1bca2175776a16d
SHA51226c33e16cb78b89bf213a295c94bf9c7703d9ff70ceca52f0ef7ca468b28dc1d60441aa18bffd104f5e20959d78a9062e5f3f03c7269cd875ea27d02a7660b07
-
Filesize
6KB
MD5c126481fbb9671ae8986fbcd6f9f7fc8
SHA10ebbd91b308ecd0620ce25a78b75dc4e9f603f86
SHA2569783bc0a39ece6e67b2e175593c5d8067074656310e012019c17902ac5787659
SHA5126f8ff8c1f3b08dbdc20713da3c07dfcd0a5888f02b687056979ed57fe2a47d78b3d92705cf95274df6371762a4bcb220023ef784468a61f70a5c237822ee76ed
-
Filesize
6KB
MD595eee8d76f66e02d0108bc6e6bc0b837
SHA168bbf19310296a48cc0aeda475558cdad16b5f0a
SHA256778c1362d8708f842c4f1e9114aaa0cdb006aea31a95c075fcc3a098bb9020aa
SHA512516f85fdbec50a99ff70b2b54e26bb2def2d6439f44e02e58c177f838755b141f3eb75dee15e277d6fa365d1433c6008a8ce4778a8c236b692f5c3a22f31a253
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50d221b7220f211d0bd12e4597358c840
SHA1fa4796e5efe1f54c022b6a3508ebfed38988790a
SHA25686534d242aee3b2b26310951b92a6f17691d50ff07619479bb09d5e9d28f8c7b
SHA51235144b876c94ba6d6a46be95edd74aeb55f2e9f16c24b94006da880eb0177b50065d2f0e72039fc79b4595ab1910a42a1e08c52944d8605be75da3c79ce7b7aa