Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
6e37254cb01ecf975c6ce6c6326dd6c3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6e37254cb01ecf975c6ce6c6326dd6c3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6e37254cb01ecf975c6ce6c6326dd6c3_JaffaCakes118.html
-
Size
137KB
-
MD5
6e37254cb01ecf975c6ce6c6326dd6c3
-
SHA1
dea74218ff5b27134eea1b666af6e713d46be89d
-
SHA256
a51626594eae9ecd35b74f35de1b57ff76903609a050daa142bcdbd968e7e895
-
SHA512
4b49c423a2defbaa4ec95aaac8bc5efdb99ae015f73d5a4841757f1e26022683285a17c2c1fc74c7a58a6bd1de6bc1ec44644eb9fceac07a981ddcacf894e4cc
-
SSDEEP
3072:SKRGhUUNcoATI+UlyfkMY+BES09JXAnyrZalI+YQ:SKRGhUUNcoATI+UQsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2240 msedge.exe 2240 msedge.exe 1944 identity_helper.exe 1944 identity_helper.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3588 2240 msedge.exe 82 PID 2240 wrote to memory of 3588 2240 msedge.exe 82 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 1556 2240 msedge.exe 83 PID 2240 wrote to memory of 2432 2240 msedge.exe 84 PID 2240 wrote to memory of 2432 2240 msedge.exe 84 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85 PID 2240 wrote to memory of 2036 2240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6e37254cb01ecf975c6ce6c6326dd6c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac3746f8,0x7ffbac374708,0x7ffbac3747182⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8052944471818031167,15131095818723987459,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5468 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9a44c9e1-9f96-4b6d-a1b2-d73a01f973a5.tmp
Filesize6KB
MD56596738e48512f4c32d699ef62284829
SHA1f65195017db89a5c306bdd96e687898673fa7a0a
SHA2565b01e97c01a9e7d9d55e8d3735635a755ec013b367c249439b960fdb609c9c94
SHA5126f54feba0bc3018077068f62ad85e23a507342065878bd63e93b25aab4c9eb8d6c662107e2f1688ff8121361734db2e703196db625aa59d67505c4aa2f341ec1
-
Filesize
5KB
MD546d37fcff361b9163892f2e6b2048eb9
SHA172f5b9ef292faeed0fb770b4af0451986ef162c9
SHA256e328605ef5162ced25aad84a1b9f6475aaa41b3345c97c2f71ec80043903db3b
SHA5122c82e9b8cd788133709228378cca6e259dd6f3206b6d448202fceb00613f145f70868cacd87c08fb8b0c4ad1d833babf2fd9a00bf65669f4ea3c475c8fe9d50d
-
Filesize
6KB
MD570df39b712241e4c5c00457d95b566a4
SHA112644fe54f43f6526720d9569b50a91b73aa42a9
SHA256b8901b939d56ce8d4ec0e9441db2890b054a0bae1a59266d38244042f1e5fcc7
SHA5126b60c07c790a664e80e44042323d38bf2a18c1a3e53a1f754db68a24ca833f7488dbbb8d87bbacd06bdc1071996677e9339b360d9c306195b7c2d589c8268f12
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52cdeec9a4e36d5a9d91f0ddc8899367d
SHA1d050becaf40715cc8fe8c032aeacada0ef546045
SHA256ed5a36e1fcb3e689fa57674c2b290b547f6a2c3b5b549ebdfb9f8f42f45c04a5
SHA5122da7bf542741d48f365f6d1631ecf0bc11ca56297b8b27597d8dd41860fd0be5723506156bfd14c06eff7584da1c08232303c3d9b3ce4db19b1fdc375b53a493