Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
6e4485a08901dc7019432e3a777b3a36_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e4485a08901dc7019432e3a777b3a36_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6e4485a08901dc7019432e3a777b3a36_JaffaCakes118.html
-
Size
16KB
-
MD5
6e4485a08901dc7019432e3a777b3a36
-
SHA1
9d6d0ad742c43c49060479a8988048dae9b26f07
-
SHA256
4d039519ff4a3e939cbf95f9f02e122dfdfda8b8aa08e8ff4eef6c26f6280e07
-
SHA512
55e8904145c7c4d02ef3a6b40759ccaac3a1076e48abed4aed107688d36b3977697c68c3e7e37d898ef92fca1662cb7ffecc75f56566c7eb0c6c3d5717a482fc
-
SSDEEP
384:WRTxF61RaKFQQTBVZ5DcnDvGogxal+2bIzd:pvNyQ7LcnD6xallbIzd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1380 msedge.exe 1380 msedge.exe 4032 identity_helper.exe 4032 identity_helper.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1684 1380 msedge.exe 83 PID 1380 wrote to memory of 1684 1380 msedge.exe 83 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 4244 1380 msedge.exe 84 PID 1380 wrote to memory of 1080 1380 msedge.exe 85 PID 1380 wrote to memory of 1080 1380 msedge.exe 85 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86 PID 1380 wrote to memory of 1836 1380 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6e4485a08901dc7019432e3a777b3a36_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad02946f8,0x7ffad0294708,0x7ffad02947182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14505545011707357719,6592805739150915591,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
195B
MD553a777b7864f9bb69a03edc78fbc1062
SHA1bd2633e8d223e9ada4b5ed336068861a5930adfe
SHA256f5012692600b6886ff8724b85efe530a85dfa0064333fa65ec5f44cfbf81a4d7
SHA512a0081e38a8e755b5ac90b74c5a02e529fd62c7e94546fadc58dace36d6322f30bd27229b5958081549de80a5a63048b9032d4d0b6f1e86137ae44a725bfbbb30
-
Filesize
6KB
MD5ecec32bdba01ac89b19ed682fe9b4404
SHA1c09d209daf2b7db3ebdfceff7b9a70f146c73c9c
SHA2568ee99c3a03df127020357116ca403397c9ba2fc924dc3772ff9dc468c8ea48f3
SHA512b2a1c7cb842a941e58271541317ddbd54d13ed7558924271d95bbb00c390e50d6f64535627ae35cf6a738f6e26d70e6198499f1c17509ec096be29758cb892fb
-
Filesize
5KB
MD5b3a79224a274b94a9118ee7ccfad3188
SHA1312786172de4af3bdd70b581731c4ba53d69d9cf
SHA256d93857be45d64fe191b034e99267565819b9652976710266a8c0aca1c35168bb
SHA512097931adb5588883d3afa6aa3bbc314e2ee70d3ffed1829c6863b2cb2abc3607aff87ac7f1b9ab717e9bf1fff271e78534882e2721bad3e2918d1fe8f24cef80
-
Filesize
6KB
MD5f3c02f4f267a4ff26c05ecda7b54afbd
SHA1f02dfb4bebfe4c3a79e530226ddbbceab1f4a2db
SHA256fba6a363ce343695fcec7408fdca4fb388c255a5b062de85d76482ac86751877
SHA51268d31698615ad6fe8b36f3f6105b29cdc496f77e1a018dd505c60a9d84148dbab9f713baa7d391d7db6dca2fd47655ab4b96dccc034aab28b39d84f4eaac9438
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5730dd59e7daa4a5d7bb3501fb34dad01
SHA18014414b64392f5144dd8421847acd4d9ac9297d
SHA2562804d745264ca8633683dbbd9517a204075bb7572286bdd756c4c40103c47cba
SHA51286d5b85e1d58f21dc536c06db67f7c9fd742f693db3561f4f6c6c6592700f0d65d3dd9cbe878d2b1614061db3b9c580c7b3f4744ea23fee648d618c858e8aa29