Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
6ffb18cc3442c4c42acac12710b72618_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6ffb18cc3442c4c42acac12710b72618_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6ffb18cc3442c4c42acac12710b72618_JaffaCakes118.html
-
Size
907KB
-
MD5
6ffb18cc3442c4c42acac12710b72618
-
SHA1
74e68171f773961e4198e007baf47f413239cd16
-
SHA256
d6ce22909fa7c0da852669f7d13bb3a70f22e17b48a3e6858419ac53ba19854d
-
SHA512
8709c006cf36de9df9672ffadc659419519f7bbeab43b4923f55a01d767cf8bf00adf0982f5d396a0f36b4d155168d81963ae9e5352d2bbb1cdf273952212084
-
SSDEEP
3072:6wwpZf2szA0N/Gd7ZXtjgDJtdYyVeeXnxOMQfw/vf2szA0N/Gd7ZXtjgDJtdYyV/:1sM2tdYyYDM6sM2tdYyYDMpJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 2388 msedge.exe 2388 msedge.exe 2756 identity_helper.exe 2756 identity_helper.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2324 2388 msedge.exe 83 PID 2388 wrote to memory of 2324 2388 msedge.exe 83 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 4580 2388 msedge.exe 84 PID 2388 wrote to memory of 3680 2388 msedge.exe 85 PID 2388 wrote to memory of 3680 2388 msedge.exe 85 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86 PID 2388 wrote to memory of 4880 2388 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6ffb18cc3442c4c42acac12710b72618_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8a7246f8,0x7ffe8a724708,0x7ffe8a7247182⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16757508085588552939,10448344055182794957,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5676 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
512B
MD539316f3e065b92dc3cb537ff5ca21ec2
SHA180a0078d212f3eb5f49a5b70f36a62b10f73e2fb
SHA25661ca7d4ec5722d20b7961c502c29998fece4653373a043840cbad6fd049113b6
SHA5128d4aec85480fc1f9efb8f83264ac299204989238cb6b5c2ae3d8941a3291f2701ba4f99fe3a37eae7fdf3dd9a75bc81b7204d3378c427a8def605ed7a7b13fc7
-
Filesize
5KB
MD533dec82692fb6d524dcea0a07122aef5
SHA16d5841a53183776de586932f21ec3aaf99901afa
SHA2563188fbcdc05c72dafe7d015160d1b8f8e47ef885fa138a48a63fec0c00e01d40
SHA512e9699b6f49fb14937f8ff33646b86bb69ab9792d4d9936a43d689c80638b2022ac0ff7edf89516ca510be3b32570de8c435ea694a3bac0a0ac78d37e2dd88690
-
Filesize
6KB
MD55248a891126885ad540d35d7dee94bb9
SHA15d7218e440a96b0dce72af1a3860cae430ad71d7
SHA2561404689ff3f67be655fb854d5717cd4004bef15d309fb829c99daa0c46ec6a84
SHA5124b9c293dc417487c105bfe4767bea2f81bd373c6a19ffc8e338d0ae4bfbe1a435f51fce96e4a65552800b3977cca43e8768728f479a62d5b0065cc995a183379
-
Filesize
6KB
MD54e65b41b7b79b6c0ca6e3e66e5e39257
SHA1ba2525b0c8375bf4f5d8f56be6cea46795a398f8
SHA256a67bb800cebf71922b555da8ff3a3d636a2d445d33815b03f711b8b0fa0365e0
SHA51247c426ec8c2a717c67baceadde4f2acd45ce5627f3c8ef51a9863caf0a0782d3ce5661e562d6cd4b2266a71ff40519117ca0c7fc066f02cd5e20a731333f1226
-
Filesize
371B
MD519231f7de7fed9761baa52ad0629019a
SHA1ed146a307d37b7d3088fa2867cc0088e06712fcc
SHA256b81506347aa927df0157dc18a1f909e32ffbbab29c089deabda31a2603d6ce26
SHA512ec4f01c8c5c3fadb825ebc785c8ab16d4520af7b175689454fa1eaf173c02849a728a21aabe3cd33740b82aa4b3c9a5053c831157ce43cb1d6a83fc5adefeb78
-
Filesize
204B
MD57d38d540817f6937f8bf5c71cf9d6548
SHA1d40fdc7412b164d91ace2a9a2feb2c792aef3c08
SHA256ceccdaef740a82d76e57956192cc3080ca5076c0c3ccecc387cd15dbe2f7ff20
SHA512a64ce8e32c070d9c1ee6acfc2ea9b40f098c12911a9f1b0009bbd000d75544551363e1dbbf33203c47388884ec8d7f498e8424b19d1eb452da45b7190c66b829
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59d6a67f1a707c0a16ff593266574baaa
SHA13934fa938fb82a6715c86ff6c83a6a4748f86792
SHA25639773b30752ffa741f693469a0d52e2794da9efaebc650310b3f97c7a3f074c6
SHA5125872122a9c9c18afce7154d4a2b987440c913c34a44429183717e835e7879df84899eeeb29e274dd985b86ac8337ff8a6c7f36c44e7af2509aab6be10945b520