Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
6c1be6b98ecfa11e39a7f8ade324f856_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c1be6b98ecfa11e39a7f8ade324f856_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6c1be6b98ecfa11e39a7f8ade324f856_JaffaCakes118.html
-
Size
26KB
-
MD5
6c1be6b98ecfa11e39a7f8ade324f856
-
SHA1
f61aa550bbdd30bd3b695af0d7731d7a1011db87
-
SHA256
8e5a094bd90ef6533e55282d084efecbb87084938846b1a5d22590db85e2a236
-
SHA512
9153b1ab70618b86a4a55c0c07d7aef1700116195e0f3dbfb48cc289c7463d7f32ced04fd6c12872df2706f04a8aa67c06ddb8a299f2b4dab082f8e38aa592f6
-
SSDEEP
768:O0eGtdBSjI4wExkv5e+vc6TmCNQiBCrmR:deGtdBSjI4w0Z+vc6TmPiBCrmR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 2980 msedge.exe 2980 msedge.exe 5656 identity_helper.exe 5656 identity_helper.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3996 2980 msedge.exe 82 PID 2980 wrote to memory of 3996 2980 msedge.exe 82 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 2772 2980 msedge.exe 83 PID 2980 wrote to memory of 1636 2980 msedge.exe 84 PID 2980 wrote to memory of 1636 2980 msedge.exe 84 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85 PID 2980 wrote to memory of 4604 2980 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c1be6b98ecfa11e39a7f8ade324f856_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1ec946f8,0x7ffa1ec94708,0x7ffa1ec947182⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1784 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9687465981263761572,8776610337685119971,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\22b995b7-a616-4368-b8e1-a7c4c55dd1cd.tmp
Filesize5KB
MD5dd94a062a40c4d525f4b9f721254120b
SHA1ffa522ffbef32b7bb6bc08c5ad34a9e8592ac85d
SHA256761ce33a2a9179538e5c2af45a162e372d45d3c540d8fce80f0f6e7fee78b37c
SHA51237625b30f461b8607ad5ca096e3d5497c43e1f0c0d14992d0320073a937ce1b254873fbbc36417bd4de9f382afeb282a711d9116b691a629382a4ce3634f3b8c
-
Filesize
179B
MD56dbbb7aab1c7c4be9c813ca08598c6df
SHA1c23052977381bac3df0580edd976901081c9b320
SHA256bc587b25ca784a23da0d482bd70b3194124194a105e05bcf1558f3d736a0a8e4
SHA5123d137a795e31be36c62c7aa4a39b09766d1b06ae4f760f97698403ff266d4444b593bd41c7e40295b995ba47bf720c35b67516301ec2061e834fb410e7285056
-
Filesize
6KB
MD522628f96847199a3e037c066fceccdd2
SHA11592b6a6dc4f3d4d7b488a16928419c2b880dda0
SHA256987f05b0c64a1525061c8b8eb5f1d613d94e5bb2085d14058687887a6cc1b74b
SHA512807283e9a125c63eb14254b348611891e18771429cafd546222675a3fc63bfee48c17e2ae74fe1a9e80462872b24ea34aaa06c362f483efc26ee6fc0a339ed0e
-
Filesize
6KB
MD57be45b2fe70d6026d84874a775976228
SHA143d2330c4311c0fbbcbfbfed9a9efae889331049
SHA256be1a2f9dedc9131d803d8243d10b0e51ee2e4ac2057b29fd113072e509aa988c
SHA5126940265e26349c6885932e7d43df52d998d0b1438c98040c4b649efcfecc190e6953426e203846d900c326fd16f1b1935692085f19d0522fe3b4a06850454d8d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a64b64079ac5b1741d91c967f931d09f
SHA1a4d2adc427a7d26e1c7a776513bb17e422eabce9
SHA25642e80f58a1ba9cfc1ee68aba5f5e54d289d2dc35045811a9abc12697f71bc5ab
SHA5124047230a68bc0e7ae2e9dfa1b0b7e6997c2b1145a32a7348080ce82ecd39700a737404d685050eb3e014307b3ef45b0a92f5a28d17b48f1b55b3b2f3f7bb9a9e