Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
6b881e44f7c71685548627683a3d98f9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b881e44f7c71685548627683a3d98f9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6b881e44f7c71685548627683a3d98f9_JaffaCakes118.html
-
Size
2KB
-
MD5
6b881e44f7c71685548627683a3d98f9
-
SHA1
c89e1b9ed6fd840d206b255ca413e503efa8960e
-
SHA256
e9bf20c9495cb784e8b85becddf9f3a95c2513462a7cc78ffe2f1456c9efbede
-
SHA512
5402e32d1c20f7b9867bfcdcf1ff95cd2ece069637bed4a76d6218bf3eb1ef7959598e99e1dc1edd81c8f0152078bfe2c2d73bd56a0596147d41b3fdad4ba5e8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3740 msedge.exe 3740 msedge.exe 2044 msedge.exe 2044 msedge.exe 4128 identity_helper.exe 4128 identity_helper.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 536 2044 msedge.exe 82 PID 2044 wrote to memory of 536 2044 msedge.exe 82 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3176 2044 msedge.exe 83 PID 2044 wrote to memory of 3740 2044 msedge.exe 84 PID 2044 wrote to memory of 3740 2044 msedge.exe 84 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85 PID 2044 wrote to memory of 112 2044 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6b881e44f7c71685548627683a3d98f9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb1b46f8,0x7ffbbb1b4708,0x7ffbbb1b47182⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,7528326977370570996,14487104558443730696,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD540ad9c28614e86a1cfaf1b35ecb1ab14
SHA1a4346ec999143c84b371b458004d6621293abf90
SHA256e365808f223c2c82f97a5665c0f160925d40e7304db5a886a11d0555ae92928a
SHA5121699b9652eefaf8b120a94129d48ba4f49f9deb850c8cffcbe0f5e00e39cd914db71570e1b996c0a0b9b57ebec0f5fb40a29c51ef46f7186f3910ab75fe27d12
-
Filesize
2KB
MD595ab525f6ef644622ed3dba9d6631779
SHA1c322231e5e6d576d5f3d0931b5d38e3576af79aa
SHA256473ada26db75011f9ea903dd50a239be89f82b96b55706775b25f522176da502
SHA512475f2cf771455bbc5bebde31e3e39ad8f616fff50e6cc7e1bd4b1cf94f76afdb32b275d6cc9db59e67ee10acbd48de36320ec85fd6d9ddf4b08e0f99bd918ab4
-
Filesize
5KB
MD54beb1c7dc4535acdf24369bd0a231a59
SHA1ee6445dae57d5d727e0d4e66ca4e97997c37165a
SHA256d924ee023efb5ef991c9d0d8e1aeb4b2165ead21c222a137f7f1931f8a2160a0
SHA51218287b637646bfd30f2e9ee76bf02d9ca4e289f2f3b34ed97f84d3611c43465a459e5caa9a41958e5e88f784f4bbc5be779bf1714ac919ef0ff2f73e0e960b8f
-
Filesize
7KB
MD5890780d80a0231abc33e56ca32eb2848
SHA173d2e910d4899121eba0bed85f21af9c7c92f936
SHA2564bb4644d47a6e899fbb6e8f9c9fcd307982b30d44e66c84160fea348789f78fd
SHA5123404ed30d57edc636b640a49e12d3e88c6ac851bddad031d3e5ebe374ca8d7cef6d1235f7726c28a0f7878b7a7940ef9744b631223bd083e541f46ec76a5ed6b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD591b8a6e06f9296560451d252894311fb
SHA1f552236689e80a6c8445631566c99c7c4090ae43
SHA25634ee1d7b1000832c67e3e6e0fcf0835fad3ecba7abc54dd3ffc1ae0d9a48bcce
SHA512557654097b18d94cce6f5f57c5dc1f95bb14240012a1a82317c47f43e0014dfb50a76fd4dd83a96e535dbcdd3bf6c7018f75722d7c94634eaafe6265f2e1631a