Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
6d0894a24b7a88971f24f8f80a21f0b0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d0894a24b7a88971f24f8f80a21f0b0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6d0894a24b7a88971f24f8f80a21f0b0_JaffaCakes118.html
-
Size
56KB
-
MD5
6d0894a24b7a88971f24f8f80a21f0b0
-
SHA1
99e8b997668aa32f2dfa6dbfd92eb4de3a101485
-
SHA256
3494afefeb40b6f54e2485038bbf0b03bc327004f38f635790ec81d133587f6f
-
SHA512
953450db62029134ff1e153848649462c2251f2be83cd52d0739a83bdcd0222d31b8870ad165a06b997e82f99bdcf5e4795487fbcf2957d9e91aba91c08b6863
-
SSDEEP
768:wLMTpHvvCIooNNUIad8Wg2Kreqh3Y6qz/6o9P+9gV8:wwdHv7oiNUNg2Kreqh06o9Po
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 2656 msedge.exe 2656 msedge.exe 2316 identity_helper.exe 2316 identity_helper.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 4240 2656 msedge.exe 85 PID 2656 wrote to memory of 4240 2656 msedge.exe 85 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 976 2656 msedge.exe 86 PID 2656 wrote to memory of 3944 2656 msedge.exe 87 PID 2656 wrote to memory of 3944 2656 msedge.exe 87 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88 PID 2656 wrote to memory of 1388 2656 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6d0894a24b7a88971f24f8f80a21f0b0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda88e46f8,0x7ffda88e4708,0x7ffda88e47182⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1312 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1804 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5987112296126641312,13861988471588825619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6df4f6d4-8711-4246-9133-899e80f52855.tmp
Filesize6KB
MD57bb179fcf4c1eb30f880eb6f1d610a84
SHA189a9c0cef8f7e6dc08bc10f3fd0fd9bd0ec1e7fd
SHA25679aefdbc0bc7566a4b0e6a010fd3a8ded6cf17a009a058e37806f86737dae3ed
SHA512ae0bf4aa3e77640a476cea59564edad3819e3ae41d06679009db13cf4ceceabc983ae9ce7966ce6ffeb5a0fe33f110d9964ca641ce1d14fa3661f1f4d6b621a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD519b9e03c220946e6b42101d60dcb356c
SHA1d8425e2f6d540dce74aa41d09c05343a4680565c
SHA256f363fa5c0975992683584dbe217778e84bf01ef3582ab4f2ecd504750c060153
SHA5125d19ceeaa70986ef1122f5753e05922913df4ed264d8e5cfb66f9b0c31ec349db7e046e1c758b787a42662ef1a77dce3e119aa9749d68d3a40fede1d43f3c69b
-
Filesize
1KB
MD5586e28b179d739a43cc1c551a9a24406
SHA1725533fd71803dcbce9ed814cfa663dbaa71178b
SHA25664d1ee4811349a8e4175c53ee086f258754cd2bab2eb3313884595a24c34e2e0
SHA51288a6af0a0b53877a7309927691eb880412d0152186aa3c89db0ee18abee967e047dd5ad8213be048f9da951ad05c465d450c2d2660364b0b5373e231ee405e97
-
Filesize
5KB
MD5a297f2509e3767df72bb2c7a167adcc4
SHA1d44294f5d2ed7ebe0cab271a340445e1b165a47b
SHA256d26b82b7af53c00f5f633fbc07cd7708718396009985f8e8461982d0100cde76
SHA51267870a3e1474fbe49d00dab3abc40f6a76676808732526e035f71528c95f47375e4ac779927340688f24e1d68f782d0b899e3d46272b2471ff9b6bd0409ea356
-
Filesize
6KB
MD5ad36c2a0049c3960dc82e95f441ace0a
SHA1f6e1923c6a90d1d9f3a27d48eebc31af2c5dcc9b
SHA25606e6ea379d97b56cefcc5ffbc9754287c83b4dda17c5185036ca9a2acf5be8ad
SHA512f34623798a0af30f6ced7418d06759f4f9f477c79fe4e35c38534e19ead72f70a451d66bace076c48c24568e8c45db75e0d18195d1cae719798f5128eef48297
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56bf720cca3cf5e7ffbd5029741cd492e
SHA10db2937da88c3e643046504fa33661c4f979b086
SHA256e102e286738c46aad01b70a2a69580e85356e93915468b588f83395ac67c0ad6
SHA512bd6948acaf202982c5c823a44c856d97cd79b700c6e41aa93a23a648efed3d4d9e23aebd7a9e5da80f12be4e5059db1cb6b4bc1e8ac545eed55931450517e1e8