Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
6d81a32ea28a04e771e017a1fd91c336_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d81a32ea28a04e771e017a1fd91c336_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6d81a32ea28a04e771e017a1fd91c336_JaffaCakes118.html
-
Size
34KB
-
MD5
6d81a32ea28a04e771e017a1fd91c336
-
SHA1
2a8b4bad55f8126678cf29edfcf1816d0a416623
-
SHA256
6f00a4a1af5301e94c5de3d053ae758b5ea6d361a6efe88844ef6947b570bc07
-
SHA512
0db483627f853f76da728a535c6981ffd45a8c766277327a7626b78566219e920658a8c8c7e8eb674c439f0c36444a742314bdc1396cdca5d5849629b0adf98a
-
SSDEEP
192:uwzTb5naVcGnQjxn5Q/0BnQie/NnCnQOkEnt0+nQTbnlnQOgAcwqYRcwqYKcwqYe:xQ/bGVw5VOh/LzIhq2EXG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 4408 msedge.exe 4408 msedge.exe 3416 identity_helper.exe 3416 identity_helper.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2028 4408 msedge.exe 83 PID 4408 wrote to memory of 2028 4408 msedge.exe 83 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 1484 4408 msedge.exe 84 PID 4408 wrote to memory of 2588 4408 msedge.exe 85 PID 4408 wrote to memory of 2588 4408 msedge.exe 85 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86 PID 4408 wrote to memory of 4708 4408 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6d81a32ea28a04e771e017a1fd91c336_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8157441535138835090,13656911798871248833,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD522e5ce8e32cb5a026359d81cfdbadece
SHA15181076943005a5ab2ac0212db76031a578eb1a1
SHA2568374b4a9c42786b0970dfb56fe074efc008675a12486a59c1986b9f32d098e93
SHA5129bee2124193a8cacb6435f065467f821ad03e4cfdcef2d8da6882a735bca4e3ec0cc579adc76a3394182dd960d38d80e9f19808691c274fe1c00f85d9bdfebac
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0daec623-cab5-4b0e-a773-20af2dc19da2.tmp
Filesize6KB
MD5ae8e0f7a6c7abdd2c6514eb00d0a5416
SHA127286fd28fba7c7da62e6ab3736679ec4131df26
SHA25685de45f20821769bf39a5669dd8e45463e4e76fd46795ba53b64434d345b44c7
SHA512d214a6aa00c33296ca1da3ca45b6c9cdd19831857a1fda3d8975739c9bcae67bafff9fb7f870841421c31ad1c36c781d97afbd57b7c94e392ca482fbd8d453cc
-
Filesize
6KB
MD5e4418b9e01267528493793c7508ee5d9
SHA14e9fab9a2992eeaafadbe7189801297ff8af022e
SHA256f4baaee8a4a7efc8774fc75fc08dee12b288276d1185db564bad13da4bba469f
SHA51294be68deb58e05d280022ce590e13ffba5c3de81d4b13b613a8cdf1b9224f78afb3342458233d31819b22702b8b1bca909ca04ab6075a96bd4c5f171474bd9ef
-
Filesize
5KB
MD529c7ffac81fa3c41a1cb1c19c8a73e4e
SHA11860f0975dba532944f223e584d3c3daecbe872e
SHA25655fdf7b6f3bd9e986ae350fcfebaa0e2b1deabf873abeb25f99c65c766f033e4
SHA51237b879ac3fcc14c11c97cbff4943536f1d7e75b989f8f89d2bffd5e05e473c59c653e52becce37d44335b1620afddbaa26d993a8706e3ae987edfb7bc5888ccf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389