Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
6c24c16786f6ebda395da9f8492eba36_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6c24c16786f6ebda395da9f8492eba36_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6c24c16786f6ebda395da9f8492eba36_JaffaCakes118.html
-
Size
17KB
-
MD5
6c24c16786f6ebda395da9f8492eba36
-
SHA1
f8394f22311c5c8ef09e1597166a4bcc232c05b8
-
SHA256
2083bb98fda9295c00aeb4c583730966b5385ab3bcd3222d43550814176fb091
-
SHA512
3465bf255e118e471e5c8eb1e10c34b6987042454d5e7d96985356d9dbde5899e568897ddee4b878bccc6acba2c7ce70304b8d0a2f9de24c672f9479acf22f39
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIf49zUnjBhfR82qDB8:SIMd0I5nvHtsvfaxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 920 msedge.exe 920 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 920 msedge.exe 920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 2832 920 msedge.exe 82 PID 920 wrote to memory of 2832 920 msedge.exe 82 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3456 920 msedge.exe 83 PID 920 wrote to memory of 3724 920 msedge.exe 84 PID 920 wrote to memory of 3724 920 msedge.exe 84 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85 PID 920 wrote to memory of 4200 920 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c24c16786f6ebda395da9f8492eba36_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf8b746f8,0x7ffaf8b74708,0x7ffaf8b747182⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,1751261455016278006,64970493002370731,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,1751261455016278006,64970493002370731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,1751261455016278006,64970493002370731,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1751261455016278006,64970493002370731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1751261455016278006,64970493002370731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,1751261455016278006,64970493002370731,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\73d8e778-beaf-49f9-98aa-89e06e5a0b58.tmp
Filesize5KB
MD51bd315f021374ed22fef5749b47482c1
SHA1951cff58065c3dcd45c9a3e44c8e4c30e86efd2a
SHA2569f6739328e37747fc28531818674d742854027212ab430feb5634cf5cb9a4302
SHA512802946289e38c47528c2502b7d16892ba4e1da1bc844e066b19a61fb7321bd34308a66cd9278f46248dd708052f1fabda34b4d54c75112bd09d6b9e921ce0144
-
Filesize
6KB
MD548ba9a7b2e1c8bb06fb1b9c759bfd42b
SHA1737245169f3098cba42e6c106cdf8f4d1e2ff0a0
SHA2569c5f0eca5d8e2790c73ae57b70ac27c03e0c572e34455d74d91500b4787a0724
SHA5128fcdb57089a64d086849452b5b6e6f22864ccbdf5ec941474d67df63fc206231fb96195e6ab021127eeb5b8ae202943db0379eae54daa0bd751dce246b8179c2
-
Filesize
6KB
MD5c09ad97e6fcf64e1d02f74689d9676ca
SHA193a567387e228eb6a4eff78f4069e57015bbfcda
SHA256a4f8450629f0f6f6912b7bbfe463c469721975c51cc243a1a29088052c158a28
SHA51265917ad0e6e72b60db6d2bfd43859578e0039741fa390ef6ff10ef4875420719d920e7ea99c824e3a76f7373f0c0ce7ebb5e083c4174eb0879f0cd35850939ff
-
Filesize
11KB
MD52199874b742f141b03a5d1d3024c3216
SHA16e577e1b38e74009e5a0d368cb98e007d972eb85
SHA2564ea802e41ac9a8a91d3892b5cfb6b4dda2db1775520db96ce557b63b8d3ea1d8
SHA5124473a2409eff7096afd30f4b0f78d5c2a672ae9b986e3a4e2e6ba609dea86c7a9756046d25d053fde59c16dfb91ed856e0e73399b5e6e81e51d5745f22b76aac