Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
6c3b07e2e0590b39234b505d6e659c42_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6c3b07e2e0590b39234b505d6e659c42_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6c3b07e2e0590b39234b505d6e659c42_JaffaCakes118.html
-
Size
94KB
-
MD5
6c3b07e2e0590b39234b505d6e659c42
-
SHA1
caa87b7fd060f7a097c88369c2de8825fa148042
-
SHA256
2f4f8b6ddb2547577d930add6636e2866ce392c8e8dab5fbefbb3351ee4e7ee0
-
SHA512
b4deba7eb57d6741188c44b0420696845a382d85710be09718552cc42ce2c9144ca4e68fad77647e3efa042b697c4478bbea523f73f7f73c7feea376def01e88
-
SSDEEP
1536:WMLiNj6LJLj9K6A7LQcE11FLMJsPfrf8/ZOyupJBdkrY8mgHC+qpEyW:WAi0Y8BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 3792 msedge.exe 3792 msedge.exe 2448 identity_helper.exe 2448 identity_helper.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 4092 3792 msedge.exe 83 PID 3792 wrote to memory of 4092 3792 msedge.exe 83 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 1544 3792 msedge.exe 84 PID 3792 wrote to memory of 4236 3792 msedge.exe 85 PID 3792 wrote to memory of 4236 3792 msedge.exe 85 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86 PID 3792 wrote to memory of 2100 3792 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c3b07e2e0590b39234b505d6e659c42_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8699846f8,0x7ff869984708,0x7ff8699847182⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,15042895361552831192,16261786066137825772,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
178B
MD5efb3e41ddcb00d4e436d59962fe73c4d
SHA14b9f2cbd664cf2136cd6966774f9ee04b4efa46a
SHA256edc776d59064e412098066a07cba55cbabb1e7d18534e1292d34003961ad3bb6
SHA51285a53139125a0e589b222ebee00d1c593eb24c8059b9f3f86196f8ef346cf7fc988493bb6f5cebf7aec2d0debc5017eff291b04e8aa37180d1ec5a6e2bb362ba
-
Filesize
6KB
MD5e1ed375a88e38fec5cb0fa692753b95b
SHA1d31e0f426bb658b01a8b865e9a14cb2ecc302e68
SHA2568dde901b2f6db8a08b31d2af75f1029bb67ac071e38ce8bbd66464445576b87d
SHA5127bd4771f49c444b6b8eea4d4c1702bce1138265b678becd303e8de2b9b4390901d5c24a4b99d63c85b7df3fef45631ec46ee9b3451247e3d5ed956318a0caca9
-
Filesize
6KB
MD59fddbe9102e0c75252cc1cd31ad6b046
SHA1af221318a8c7cb7a6359a19feda8a394c9b732ea
SHA25695f66105166d6164b35e7fd66126a719b3cba049d87e9c7139fe45caf26901c4
SHA512d4506cdea88a1d6fbca98da9109a30e8af0e98e6358136ac959565b25a219de2d7e6c441e83463212f8ae620111c95d0503d86b5f623b34c5ec078a6907bf54f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a8d4a2bd-d211-450d-bfea-d8d3d3508c25.tmp
Filesize5KB
MD5a5508226a3a495deb7b9b861d2e00efa
SHA1bce4e757af24721973e946da4f728400e97a0d20
SHA25630bff41f62929e7ac40329011de386ed4fd546c0db09dd49cf909c69745e6cab
SHA5121e02eca643cd9e59c7f3657e7ca255cc9f9272e108063e98fad097a72cbcf4a377b0af4effef274ee53545c8a9c6d9cebb6404570b3c17c672b53877f8039584
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5811b4cf91de512237585c1086464558c
SHA1535b42a1019d801a87f558e7f9db38efc8f8fa7e
SHA25657618f5154a1a988dae28825aff393a48e21f34976824448d31ceed8e4a7b1f5
SHA512bfe30ece46a1eb8e1a177011d0dcf515f760411daa047d71f75433955e8056692664d8e38ac29dc2a0a1e25470db116dd9f695f52cebb04e4189355122dae286