Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
6ffd676bf4c0615b10f327fedefa811b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6ffd676bf4c0615b10f327fedefa811b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6ffd676bf4c0615b10f327fedefa811b_JaffaCakes118.html
-
Size
46KB
-
MD5
6ffd676bf4c0615b10f327fedefa811b
-
SHA1
a787155ee872e38d74ac7029700b6bd652a777d6
-
SHA256
e907ed742159e3b55560e5a05afafd924ace53ee249fe892dde72ccdfd64324a
-
SHA512
9352493907c607101472aa35d37befd565a8bf2dc20732509575f03d76fdc88b0efa8e6d3883f063167f7e5f8eaf507f0071734c45535da693d1dbd734247b4b
-
SSDEEP
768:5vxUf5kBqkD2LfjoPAxoUTr9rsMQrhrIy0PbCD2FPc:5vxUBk8y2oUTr9rsMQrhr+g2FU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 764 msedge.exe 764 msedge.exe 4828 msedge.exe 4828 msedge.exe 3448 identity_helper.exe 3448 identity_helper.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4448 4828 msedge.exe 83 PID 4828 wrote to memory of 4448 4828 msedge.exe 83 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 5012 4828 msedge.exe 84 PID 4828 wrote to memory of 764 4828 msedge.exe 85 PID 4828 wrote to memory of 764 4828 msedge.exe 85 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86 PID 4828 wrote to memory of 1604 4828 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6ffd676bf4c0615b10f327fedefa811b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa94c146f8,0x7ffa94c14708,0x7ffa94c147182⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10216547505883717384,13781612789869244363,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
313B
MD51980ece8327e7c5515cc7d96436ad3e3
SHA1b3c75e97635eeefe3e6a86c0163b58f27747b570
SHA2568bf304794c9f8af48de09a81df69f3b85b0ef6a27cdd9fd82e47131d6d1928e1
SHA512421ae0951a8b6bcfcb1024e939a99c618151c94a790377fe5135e1cb191dd9da2c6468b8fff6eca56fbc01174eea867308cf9a1e21b498ea314bb1202afa3b21
-
Filesize
5KB
MD5baa38c57ad87ce34e329f83746ff2035
SHA1db14863a19a48d67cf037903d8ad26645728f447
SHA256c8f1f49843b5c71231d0f230f8a41f50601595fa12d8c719e54d43f9426c00df
SHA512d03b0542ff0d87baa0f5deef5a684eca462336a263c838127ab40459db305de83e2a29b8079e50ed83eeeeaace78437b2e0e7a4a892c49a3fef726a22eaa0855
-
Filesize
6KB
MD5e9740cbbdaf180bd048297fa5586bc97
SHA18a782727f394b5d0b61206731880c3a2ada33075
SHA2568632f3641df95051fa41d1b72a8e29e3b689f5eaa49a6a0cfc580861f5891491
SHA512ae01daab54d8da6f02cbad8cd71efc346ad1b079092ecf81c5a992f982c4a231ee258d8442b7ba719205dd08cd93db921ccac20860284705f2eabc1e0b2a70b8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b5134b753a17568026c6c2e5bc3c9c2e
SHA1972b2aa32ee40d8bb55b9a32b854a72ab4686fd3
SHA256c90d3c5ab52179893311665fa0673424726d152cbd927d42a1c66b0f899fbed7
SHA512c61d317dbbff974f6aca1665eb1395458630d6d3d7bf46ad392491974d8168b3b27edf335fba8107170fd1f0e09bbc22c59970cf7c335c445e3d5514f37297d3