Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
6df4696529944cb35cf7dd81f0c4a47f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6df4696529944cb35cf7dd81f0c4a47f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6df4696529944cb35cf7dd81f0c4a47f_JaffaCakes118.html
-
Size
31KB
-
MD5
6df4696529944cb35cf7dd81f0c4a47f
-
SHA1
1fb2a955227c4677d4a9cf978039a68bf6ace07e
-
SHA256
7b6f7d7cc52c31d86c8e522ad6260718c4f166ea5d643d1f291b9f361f2b4149
-
SHA512
8b9cafb2ddaa0fab8515fe0949315e2503014f3b3222e2e32a66564663cd08aba0a7a3a1d2d32efe632eb15b173558c3cc63abab2ed251bd48ab1358208e3e2c
-
SSDEEP
384:Y8K3+Ax9TSePUCPkPgPuPGLax08Dr8BBVkJi2UXlsAyqFLHREy0L60+UmHe18KTz:LKuYNs4GeeGkIdhsPc0Lri+1JTZhf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 2936 msedge.exe 2936 msedge.exe 1380 identity_helper.exe 1380 identity_helper.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3192 2936 msedge.exe 85 PID 2936 wrote to memory of 3192 2936 msedge.exe 85 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 4308 2936 msedge.exe 86 PID 2936 wrote to memory of 5032 2936 msedge.exe 87 PID 2936 wrote to memory of 5032 2936 msedge.exe 87 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88 PID 2936 wrote to memory of 2912 2936 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6df4696529944cb35cf7dd81f0c4a47f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe6c446f8,0x7ffbe6c44708,0x7ffbe6c447182⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17930318575066999837,4475452675621633091,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5a0bdd73a03326c17b825945a24e0b49e
SHA1015453c1186b244a1bf7d2d9ccac7555e8b976e7
SHA2563dd734dafda45cccf6eed2d4f2dc691c99747252ccd447ac5d527990b9039684
SHA512dec50536149cb4d059c18eba6ad8cece9b0d9bf8448516a33f2c24b7c59c443343939e676a9a6bc715b978cc92969f500bb30cce958e96a88a24b25ec1f4f0c5
-
Filesize
6KB
MD55741d4cc3cc14fd9990a5f0e976a09c5
SHA1e2cb447a6b6fe8ce51487babd7e3669bfe29d36e
SHA2568da6934b57d969ee208f3b37e595bf1c77527499a226b8e3086fcb724c0213e2
SHA51282cd5aeec91b824249c5610ad7044c3102a4c293c23e19c2de570d5f4e4dd17a5acd1a4f07ce8d497f3d7f8aa1eba04296c78b00c8a27245b576ff33b7f58acc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51380a62577e020070eb82f3c061567ce
SHA15c2b80447557dbdc6c0833a599434d67c089fd7c
SHA256f4ab439e3756caf3dbdabf374bff3ab723b2b4c5b0543153f0e421d76e8ec0de
SHA512316b1387f3d3c7be811cab511ad288a02ebc838619962e199553748ab902304773e6974ea6be38f2db88b3e6f270eefcf43b5bc6293c4c251b3ee26ce34c1470