Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
6c144b793784ebe396ad1fe455332d44_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c144b793784ebe396ad1fe455332d44_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6c144b793784ebe396ad1fe455332d44_JaffaCakes118.html
-
Size
32KB
-
MD5
6c144b793784ebe396ad1fe455332d44
-
SHA1
5d31b38734404e4a495e6bb02a9a6b2ded73d512
-
SHA256
634cd5b80936053b5a597d729660405394ccc9b66330c8687fae05069a8b9418
-
SHA512
573ce83e636dc384ab91a97ffe65c2968e94fa76bf016baed2239a7a4eea90d2f0a98a10e3f028c665cf7ebc2e14e3f6a0c257d5c4a0cc269b9f63ac879bac0c
-
SSDEEP
192:uW8r9sBONFVI6Fb5nxrcTt/krmiMGGr0ofnQjxn5Q/vZnQieLANn2oWnQOkEntl5:oQ/LTPtOe2RUt6+XOoqP0d+NSW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2664 msedge.exe 2664 msedge.exe 2392 identity_helper.exe 2392 identity_helper.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 1348 2664 msedge.exe 82 PID 2664 wrote to memory of 1348 2664 msedge.exe 82 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 4576 2664 msedge.exe 83 PID 2664 wrote to memory of 2032 2664 msedge.exe 84 PID 2664 wrote to memory of 2032 2664 msedge.exe 84 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85 PID 2664 wrote to memory of 3684 2664 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c144b793784ebe396ad1fe455332d44_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92b3a46f8,0x7ff92b3a4708,0x7ff92b3a47182⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16723318049944472152,14953601812582943968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3392 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD595fa5b856363d4a18664d046fb7dc702
SHA1bfdff824796f0693627c836d46bc68d0022d80e1
SHA256bb491473f57118d67444474e3f8a4fb734a5cec205e8ec7d20996b4bdd21c4f2
SHA512c061bb0f0429904a7fe3f6b2a2880fb25b7a355dc828525add7aeb9a2ede1ac7ec07c47950d265ffc6a946d2aff0c99135b4d40fb1c386b5620a0782cce850da
-
Filesize
6KB
MD5812b6098b7d3efca902d9e3147836dfa
SHA1830735e258e0c13fc50baac983f097aeab78f88c
SHA2563556b8301183a8d29a1a6fa674a33a65cb97032baa1372f0130d4799d29bf6b3
SHA512bb5bf0a14d06da5f709b8401cbe8b74b7f424b5d520b7440bfd73f9fcd68441fff556eca6bee14d3377acd383917afef9a6b534e04d47477e8ad7fb50d13d617
-
Filesize
6KB
MD54f607a7010a7ce74764b5921a33c4934
SHA1f742c932409d1b2e14913a50efdb2e1705ae78e7
SHA2567bd841683e459410882be819c0fc2a1ce57fa1d62411d471952a5851fbe785fe
SHA512a57ec8c9e2812c1a46e2cbfc1a950f38009d00709dd95241de4a6687473163bd0bd71a3345b6c57c67c95f2494653e4b0863c96e4936128d88d31ac4b8d854d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c4d8804478a627c89f457be34f7ae25d
SHA1c6956ee1331303cbf8dd6a011022d797baf7c183
SHA256a609883b254251541862da8d5c372a29a9a61e973a3135ede47ae9569d5e7b68
SHA5128f52afb1f958183e2b623dc73a6590917dd18d645016428c8b1581bccc84dc00ffe50e949e8356fab5d47d0228ce709d8fd4d400cf125b33143b5ddc410fb51e