Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
6e133edb11dee6c84f35d7834d445ba0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e133edb11dee6c84f35d7834d445ba0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6e133edb11dee6c84f35d7834d445ba0_JaffaCakes118.html
-
Size
18KB
-
MD5
6e133edb11dee6c84f35d7834d445ba0
-
SHA1
ec10a360fa8bf7a19fe8403da6c79f41e84512fa
-
SHA256
613c78d6df3b50dea5c5f04f9733f25b4754d39738ffd9d3e4e66abf62e179b2
-
SHA512
3e4787277d6f685d90fa21044f5f370c5cf0f646a045106f3a25521d351ad2bb944a206f582c0e3e18623433d19404d7ae576d582f3cb4e2162002cb5dc35181
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIL8QASG4kWmmYulwv3zUnjBhM30h82qDB8:SIMd0I5nvHDsvktxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 4580 msedge.exe 4580 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 60 4580 msedge.exe 82 PID 4580 wrote to memory of 60 4580 msedge.exe 82 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 668 4580 msedge.exe 83 PID 4580 wrote to memory of 3744 4580 msedge.exe 84 PID 4580 wrote to memory of 3744 4580 msedge.exe 84 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85 PID 4580 wrote to memory of 1648 4580 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6e133edb11dee6c84f35d7834d445ba0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5642931085616115652,3395146823417599481,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,5642931085616115652,3395146823417599481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,5642931085616115652,3395146823417599481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5642931085616115652,3395146823417599481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5642931085616115652,3395146823417599481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5642931085616115652,3395146823417599481,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5aa85bcfcd9182c42c18f01413ee747ef
SHA17b81262c85dc9c38af79ee90d78645d855d3e4c2
SHA256fef380571b9dfdfd0cbe8a461b839fea073fef6dc0de5b828de65a3cab564a64
SHA512885492a7f7f95ee2822aeb6c540e9d5a807e7e4679cebf6b0fc7d85a92feb82750bd42409d0db36c0092a919d197ab78290d25cbe26237733cf8b17ee47285ba
-
Filesize
6KB
MD5ee5fb1cfe6681be39b9782470c64b37f
SHA1a9dfc2dd1bca673e51f4ec9b279925ff63a4b8a7
SHA2568ecacfafdcb05c102c41e8647d300bd5ff50f604682519e43f3be70e4467e9a9
SHA512aa267d639e69fd8d6dac8e617645bef36e1c425bbae02d6041d46a13ed5392d1943814dc55744dfa8a6783d44d865ce5a76277568f02a95786c1a1f3e4ab0ea4
-
Filesize
6KB
MD535c504729f309d045bb354eee8d74125
SHA15fd98be89bb826c3106ab0bdbc2fbb5859a0490a
SHA256a445b1144a9b1f73d8a3d6a97ccf7c11cb534012a0a7d24258b08bf56fd2e7bb
SHA5124679b18009f18e5774873dca04f3a134f42aae2dd69b8861e0e5a181b36c97da3aa21677cf43b45b223e8f8dda13b8c98c14d9e8ae2e6bbe151078d5765d7808
-
Filesize
11KB
MD53f1b2dd2f1baf0c6ec9bccbf8a544bcf
SHA11e442716a3c25ee73b143c42633bfbabbedc2494
SHA256f073334f0a81ea2e4cba15d46b64f75a7c7208cf2c38b32817451b02ac72f600
SHA512de108b8b0d66fe714d2bc053d2f361e9dd1fa56c7e0055c6fa49b14c29f2d639130f83789ca2286da23f1fe8f74b0b946fcd1f29d6ccc494d3b6811fc1fbd303