Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
6bcb506d3b0b3689e9a7a52ec130066b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6bcb506d3b0b3689e9a7a52ec130066b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6bcb506d3b0b3689e9a7a52ec130066b_JaffaCakes118.html
-
Size
189KB
-
MD5
6bcb506d3b0b3689e9a7a52ec130066b
-
SHA1
ded20342de9e489d87b659a66fc389f9c8c020bf
-
SHA256
0823203377866df558c9eb8f3af7cccc30d4a0ef48e0ebc7d90bf47dfa863e3a
-
SHA512
40666c7afc8d77c392befbcd12d9b9737f3abdec607c032611d46415df1d4b980d1c3281ca1b478c1ffa9a835177be66fa7d82a4dcd73447b542aea3d8e66662
-
SSDEEP
3072:2cgRWMdY9SIP3lFEBZNKDjEgORjlIlUlkOxYO42uoalDCv5C+zMMgIOR63B5DQb2:2cgRWMdY9SIP3l2BjKORjlIlUlVr42cC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 828 msedge.exe 828 msedge.exe 208 msedge.exe 208 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 208 wrote to memory of 320 208 msedge.exe msedge.exe PID 208 wrote to memory of 320 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 676 208 msedge.exe msedge.exe PID 208 wrote to memory of 828 208 msedge.exe msedge.exe PID 208 wrote to memory of 828 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe PID 208 wrote to memory of 1720 208 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6bcb506d3b0b3689e9a7a52ec130066b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed44d46f8,0x7ffed44d4708,0x7ffed44d47182⤵PID:320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,459802607494818005,6882366948799489152,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,459802607494818005,6882366948799489152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,459802607494818005,6882366948799489152,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,459802607494818005,6882366948799489152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,459802607494818005,6882366948799489152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,459802607494818005,6882366948799489152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:2140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,459802607494818005,6882366948799489152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:4168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,459802607494818005,6882366948799489152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:3776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,459802607494818005,6882366948799489152,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
96B
MD52583ac4eba11226b35b5fe556298f00f
SHA120cfd974e929049dea4bc836a508aa4a559255b1
SHA25679b63a77cdc24a167625641e1444b3655c21e1983761e1d7e66f649b7bfd7325
SHA512c2c4229d58ca141c9612e6a001c80489b4222ec8135ee220451d5faea529228a5c82425f059e6ea43a9664625e934576eee83a83ab0442269e039cb17e656eb8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD52aa9aa65ff0230694bd60f61711e7393
SHA1896a76c01f7d86c67b8032403908ac6767ff9d4e
SHA2560eebfa5738e4851d974f026a5b2c5eac63ec277c6a6b3d2974784af0a62b90cf
SHA5120f5313150c9d69f956b925e69669a2deaed5d0942c446190f10df376926d376610ebe7801a3c4edd064b2962b447dac49b8257a0e00ce8d5bafe8610ebefca9d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD56abdf489dcca3e7f2c0c7a14f60963ed
SHA10e8c2b51073fcb9d7e4f38714ddc34b25ba9eb88
SHA25685d94b66778734d3f46c48cce7ff4dd23bbeaf94bf546c6b5dd011859c0ba40e
SHA512aa762b6b8a3022f908df85160f2cd724a2fb966c8576a80182afb296e560fbbd2fb5c8bb949e8a7c994fa1c3443368a98c89889e7e8cc6f47363c0cfe5a2d918
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD571c86d14df14361d785aef10db47d7c8
SHA1c5135973262307d67131463eac2ee7c03da83a95
SHA256ddcb876eb0bdd7df79c79f2ce3719d5edb31e24edec765d6e69ff400edaa8f71
SHA51295eccd5bede8506a5487138be012c0c147b53213bd53a55b09591b0d372ad44afa617e14ac0c0580c9ef8a1d38698f351565ab6141a5bcabc2528c4ccfb86207
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5b5f42419736ed0f7dd7f1db382077686
SHA1042e1e231433dfd8e5f537a1b2b80f0cb76e6337
SHA256d82cccf7f91d5d0b5eb0c5f51e32ae5be037def739d45d15b74d50372ca3f7d7
SHA51266842dba6a516792b2e662287fe96a7453001c246b8b2f467d5ae6fc908124fcc43f8bca063191be901da8646bf2c0a291ecad827c20aa97322d795b316ea15a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5d98c26a04c39af3c871ae2c36d7de7a5
SHA14dfa563d2b033ef6f945f5e285d82c1fde18b181
SHA256555cc0e568268e9a02b9a8c061676884adfce3a2d7fee83094ccb587eff4664f
SHA51215c3148b0a5f4b74da3b72992716cf3c5a7373372eaaa2db0c88729759bd499ccdf7978aba6d61ff4bc99472652551223190c4e6e58d74335cdd6a5c84caee84
-
\??\pipe\LOCAL\crashpad_208_IADDJYGWRVVDTAQCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e