Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
6df655a083b88c2f7e016708e066460f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6df655a083b88c2f7e016708e066460f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6df655a083b88c2f7e016708e066460f_JaffaCakes118.html
-
Size
20KB
-
MD5
6df655a083b88c2f7e016708e066460f
-
SHA1
a1d2cbe602a3a540ff19743e73c37ad727c6e417
-
SHA256
3ea566ebe1e2f90dcdb15a5f8bc056dec21ac7dc7f7eec2dd2dec20414103658
-
SHA512
8b44128d9348086b1be46b5043e98a56bb5132c3765c3e73307090cad2f4decad0dfe3578bf149af16a2e102ac304fd4fa9240da35a2b4b2b8e545ac64c134c7
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIh4tzUnjBhz182qDB8:SIMd0I5nvHBsvzOxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 372 msedge.exe 372 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 372 msedge.exe 372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 372 wrote to memory of 2468 372 msedge.exe 83 PID 372 wrote to memory of 2468 372 msedge.exe 83 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2656 372 msedge.exe 84 PID 372 wrote to memory of 2700 372 msedge.exe 85 PID 372 wrote to memory of 2700 372 msedge.exe 85 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86 PID 372 wrote to memory of 2000 372 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6df655a083b88c2f7e016708e066460f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe8b946f8,0x7fffe8b94708,0x7fffe8b947182⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11375578233623245601,10369499751831922060,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,11375578233623245601,10369499751831922060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,11375578233623245601,10369499751831922060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11375578233623245601,10369499751831922060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11375578233623245601,10369499751831922060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11375578233623245601,10369499751831922060,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD55bdf2b7a43704f6900ef0dabe8427de1
SHA1e98f4041a5be91e5ebf64fc6d6fe75593f8dcedf
SHA256adf011c98af24fb745e562ef8d60f99fe3c0c0eebea052123bc8b4d490d12b49
SHA5124c74d5228cff5b348ca7e0ef8b7012fa911d855183eda837efd1bb8f7c8a2eba0361e94677ca2300039a794954d9e54d2a8c93ffd61d3f81810f18bb581865c6
-
Filesize
5KB
MD520670a832bb434cc8627a094218e4eb6
SHA16b2dfd3eea734b4be5f9337d54dd318bfef5b272
SHA25635645f28c0452eb9a0594115452fa7f7b7b1b5fb2d53a5a82a175123d04353d3
SHA51235dca79cf6be93984352b9667d4f719f7514907dc2c3032ca43ada12771b273ff741501a37d5557f73adf8c62eb7c743b10402395bd3ccc9e9c6c5eab8d9edfd
-
Filesize
6KB
MD50eb7fdd7a93d881c96007ac9c1869f92
SHA1c5d1eb6d58a15471836cb61a81f592119d1188ab
SHA2569f167497f7dc264c82cc5ad15cdfa21a93afd5b38bf97ec7ef9054beb7c863ce
SHA5124b8d5b91ab154963b4dac3b4fc11fcc5339aa53455b1ed2eb702d211a105e650cd7cbe5fce4124f00314b6136fd2b95f2b59e485d9644bf041a8eceab9864bd7
-
Filesize
11KB
MD5c6033165288d1c2a582e47e652647e04
SHA11cf3d53d82c2ce74273e8d6cf1ee32824e110397
SHA256a66a3235882f1d162cc2253d1ff2da09fa844bd39324e828fc1b51547c104bc6
SHA512561f989e29ded9c880a21758654dc15af13d93d129f4ea5feb9be0c230605223b27885e3724d6ece7b602e6a444c7b8380394971a8ad0b869439dbc3deb19140