Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
6bb3efad67d7700b9a2a28b3368fad65_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6bb3efad67d7700b9a2a28b3368fad65_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6bb3efad67d7700b9a2a28b3368fad65_JaffaCakes118.html
-
Size
17KB
-
MD5
6bb3efad67d7700b9a2a28b3368fad65
-
SHA1
9a5591d2b77b29595ae7ae65978d98891cff1110
-
SHA256
ddddeeeaa4e23ce81ad61e3865b23fbb1aa34bcb7ef8e0575613446fc8c05853
-
SHA512
35c43f189bd8f82a1e6eab6d032b7279c038e3de24148216c5f3cafcdc23ca7e145ba1efb669b77c547c853bb6dd4f8eff55234448a42aa9787c758dbadc4ece
-
SSDEEP
384:jRmSJ6cxRVz9LYqsF2eZa7ta/X8E8FIICQzyjVVX6zKg6gWnMjBJlX:+cPVFZsF2eQ7ta/X8dIIUVX6mg6gWnM9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1700 msedge.exe 1700 msedge.exe 3372 identity_helper.exe 3372 identity_helper.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 4384 1700 msedge.exe 83 PID 1700 wrote to memory of 4384 1700 msedge.exe 83 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 4048 1700 msedge.exe 84 PID 1700 wrote to memory of 1464 1700 msedge.exe 85 PID 1700 wrote to memory of 1464 1700 msedge.exe 85 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86 PID 1700 wrote to memory of 924 1700 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6bb3efad67d7700b9a2a28b3368fad65_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffca1246f8,0x7fffca124708,0x7fffca1247182⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16461671959582353667,5824052947635812169,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
580B
MD502b617ccc076a241942aa9e0c49cee63
SHA18789447b4c350f6586af77cf722ba978fecc1eca
SHA25624d79fa337b7342e24308c56f7516d2b9e08cc46584debfbce2335aad6252e90
SHA5120624fe45f1a52b35473581bb4b11c82a783ffacbd68e9d3097ab84590be8d2c68be8ef328342892c00ecfd87eeda40831dc7872508d595ddfba676c6c1198d98
-
Filesize
5KB
MD5f1f340b593a0709cf498b92db875254c
SHA151d98be8d170df3552b38dbe7961c7dc0ce66d70
SHA2565efd9ba57c3bbf0f09dbd6e27a60f72765b80be9fca46362b02d6ddbec4b6f1b
SHA512381dfdfec7234c03e5eecbfa5e7dc3316e09c255cc140169bf2e09ccf31ab78e96b2e4026817506e159b38a05496560baef445f4e1e9bf0e9ad13d761e340992
-
Filesize
6KB
MD59ff642074bf5107235581dec64be1aec
SHA14103d89ab8b2be4535dcfdba833ce04305e512c0
SHA256041d19fb6ecc4e5f4baaf398cfdf628da6c5a029d9d6a679ebd1b529b4e8342d
SHA512e4dd04a7cb5096bfe615875fc84016c046941ac1c0431d1ce7ee85877e6e69f1a5b3976d76525dd0e30f08f0a3f9ad7fa542cf832ce89b9f2882b10e4ecd4f40
-
Filesize
6KB
MD54d72ec2b6fac8df5dcb55726ddb87f44
SHA1d6fd70600550258e5c72fbbf28b030d877f95474
SHA256b0c7c22095ab7fc7ca881cdae6b9e1c60afb866564f4a7e55812897bf4ccb44e
SHA512143e0b50fad239b4c63570e03325566df68f42c8bd3fb0d1a6fd4f3af1de217a94bbe9c5f7bd1a663d36d7c58181071412167581b2b3234306969f18a4bcb8ef
-
Filesize
203B
MD56a08bf17f9a90f898d37453f00367b14
SHA14d858bc1a27d36db381b06756911381dd575508e
SHA2562d3f53d0172fe3143632c3bb55fd5be42a7ae49fe47672f6b45a7b67429c2b67
SHA51207490f9e2ffb5991901daf6645e8b46de8a07476348a3752ddc001aa8612b97a2c532a87b459ff2c6da75f2b680c8f4f6d1636ff7a1c8a5d67f7ef81e67b2d6f
-
Filesize
203B
MD51f1c706140e2088c7c9a45e986177c15
SHA11b4bea792157dd7e3ce3cf0222d079a18c152218
SHA256dac9625884a0f1e699e109c2012c5c955fb0181566bbf528cc435d53e6e71234
SHA5124def2d3af6342c60e7abab6624d5123b9e24418b0538434c32ebac13a07be816959d358295a26683a0d9646aaa7681ab03fd8aec6438c36e02c547dc09a6b17f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD576c39456c4a214063e8e1e50a98a9c8c
SHA187652361984f536e4b622a505c5b3ffb30f0a13a
SHA256b4fed671dabbf39130c36f94873aa02441fb636e72d5dd924d450d2043ee568c
SHA512abdfc382839446ff0a7006f6fd021ddf2b8ab8795d7a4af8850d849615cdad0302af7465cb4cd8e4e9fc035a95731ec62ccc4d643ecca60319396c642a7e3f41