Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
6e1132863ee22f9c57a6c6b89f4da8d6_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6e1132863ee22f9c57a6c6b89f4da8d6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6e1132863ee22f9c57a6c6b89f4da8d6_JaffaCakes118.html
-
Size
21KB
-
MD5
6e1132863ee22f9c57a6c6b89f4da8d6
-
SHA1
37c75681894d6dc1f3c5cd0e02c71bddd0cb8bd2
-
SHA256
56f846194db4955c29f7e63c9590201cecb21f056cfa34f681dada87ace20026
-
SHA512
349c6475d93aa7a1688f1fd8c5815f0787c6c6814e3ee1815909ffe8f717c7d877eec495e7e13fd65a5489137065b30472c5004b29b89e672f89db17a4b42ef5
-
SSDEEP
192:Hqvl596UDWvWOJYsEEk9JZo2UQB7D09Vea9JySdNVMjP0kuOb:Kd59cu+EEk22RpaaRP0ku0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 4632 msedge.exe 4632 msedge.exe 2092 identity_helper.exe 2092 identity_helper.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 3564 4632 msedge.exe 83 PID 4632 wrote to memory of 3564 4632 msedge.exe 83 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2064 4632 msedge.exe 84 PID 4632 wrote to memory of 2912 4632 msedge.exe 85 PID 4632 wrote to memory of 2912 4632 msedge.exe 85 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86 PID 4632 wrote to memory of 3704 4632 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6e1132863ee22f9c57a6c6b89f4da8d6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80f8046f8,0x7ff80f804708,0x7ff80f8047182⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,16419507991533629988,11123699773038934047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
188B
MD53ac70ec3b01b9b8b6105f0bf9ed9ad3c
SHA1270315259bf2d3a7e3d60bf38dc4093cb71fb64f
SHA2565a7cb3578ec3915ed31d0d988f6c7e378e39a9efec5194c114b08d13e324ceca
SHA512825e4ef334d21fbe3702355d27e5ebe3fe60d530d9be9330c6cde61d4a9e0121c36c717bbcf69cedc4a1f1d8349b687ad2d82cc8f45209c0233034b063d745e5
-
Filesize
5KB
MD5530f8cb25d7d57fd0022b84adfacb0f0
SHA16505ab5294a26ea7647a5c20d169eb41604efed4
SHA256342ba9ebca44d666708d2a3ba8a858f04c8e25a5604e99615ba719474cb5dd4f
SHA512d425df4e781cbf94d6ad2a5843c138bf02bae74aea19ec8a732dd354eb248619a9c8df902e78e72e36169d5f36fb3d7c99d397ec34cf57c368048b47118bab9e
-
Filesize
6KB
MD56c4ee30facc03f7a1b69fd910ed94472
SHA194415a6737f2b0c939f835184fb20cab958ac970
SHA2569e5a02a791fcd7749afe94732eefa10942e0b0c925f2b98f83f054bede44b553
SHA5129dfa2ba776665fb20bdcacaf95bfa195a69531194105f7c3a15cf6ada2a68a338c8121026fabeb1f4d2376ba5f6826c66dd38b3fbf564ada5da1a53703f9cc36
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD554759ba4876db356b01a96a1cbcf2b86
SHA1586e5dad67c127aff1254b417bd1273a965fce8f
SHA2566f02a57484746b76267cf9552a790ceceea7acefb5d0b4fcf510ae789f4c6813
SHA512832bf683e7d29159edb299d4d57930f97666d4d337b489f233dbfe1908b16dbda048c0b34c25d637e4ce0a350fc15f03e08f9b11c61f69fbce942d035727e466