Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
6d9dc4422d384285552054b94c43a282_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6d9dc4422d384285552054b94c43a282_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d9dc4422d384285552054b94c43a282_JaffaCakes118.html
-
Size
43KB
-
MD5
6d9dc4422d384285552054b94c43a282
-
SHA1
6c0e3535068227ba723691a18ade8c92156e7887
-
SHA256
d3af9a5bd6f3481008cb23349fa1c2050c3f6467d0172ea0171ca73bf292e1e6
-
SHA512
ff6eec2d0c0f73cb02541d9f9762c818c72ed598ed7649e6aa602921b5554c3dc7afcf1818fb09228834f7a1ddf70249f94d65b05ae699b70c91f75778ae42b5
-
SSDEEP
192:uwfib5n2eynQjxn5Q/lnQieoNnWnQOkEntHfnQTbnRnQmSnx3DWPljQelkPK2QsU:MbQ/HGxYqRhCL3j6v9gNmRDAz1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 1124 msedge.exe 1124 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 4436 identity_helper.exe 4436 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1124 wrote to memory of 4140 1124 msedge.exe 83 PID 1124 wrote to memory of 4140 1124 msedge.exe 83 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 4932 1124 msedge.exe 84 PID 1124 wrote to memory of 3096 1124 msedge.exe 85 PID 1124 wrote to memory of 3096 1124 msedge.exe 85 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86 PID 1124 wrote to memory of 1216 1124 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6d9dc4422d384285552054b94c43a282_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa127d46f8,0x7ffa127d4708,0x7ffa127d47182⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2988 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12702893690544240609,1974621421426880506,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:3748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5c8183ff3768db24ae84974042969e205
SHA1440830fcd1065c6fd51b8e6800c1b00a17ee6043
SHA25638cb78ebd423a4a3d0d660f8f51fa49f0a88ab6d9d001870d1a4448c217fa485
SHA512f50449a1fe606c5c507b41b6ca4aeee5fcce3fd166d68cc3af1674ee0ccf9144c9e6db3c4e169f01c27ed2886c298d671c9aab1e8963a6a50c86da7f03acfeb3
-
Filesize
6KB
MD52f6405eac6db4e4955be3e0c4c5edd18
SHA10bd38e02d46906e1b5f49eb5c10edc6270d7da36
SHA256d44c289668dc7a753764dc0f68d9948a108cec813343f7163e0f5e6f6246294f
SHA512419bde730a7d98127b402ef2c70a4b4ed513f1104e3a4f197820177721086f62df89299793cdeaee58bd7f9103fc11a6299fbbae2c1e06d250cee3d914fdd392
-
Filesize
6KB
MD54f216d4e3c6473e38dd085ccb5fe9b2e
SHA18a6a154d8132d8e30f05027776840b06e65b21c4
SHA256c9e60d8fa718ffbb9ce13577bf68ec34644f387acb47f3eda8fc4d4ea5d4f315
SHA512455a51f4612e5973e028468dfc378cac9c60ab4d8734016c4d2fcd1844a79ad485be80dfdeff68ba1a8edb8cf1b091bb719d26fb7b34cbade54477b9740ccc31
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d01ec135cdd655a7b9182be722a9ca75
SHA15865a46e4457894b1aab3f77f57fe807a7718a13
SHA2569bfd59b1a0575b163323344bbe182fb4e7dfbd7266ca04e17a32cdb6a4c7f53b
SHA5125957817bf6bff3d776024b9ed0bbc5d7bc36f27f76cef854a5f748c20e6aa1e9c5600551a2f9ce6ee4d2333f9f43eeb1fd835fd125445c992e54599d8b0fd661