Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
6e6ce4872d8390c70399f5b3c6a2ec46_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6e6ce4872d8390c70399f5b3c6a2ec46_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6e6ce4872d8390c70399f5b3c6a2ec46_JaffaCakes118.html
-
Size
832B
-
MD5
6e6ce4872d8390c70399f5b3c6a2ec46
-
SHA1
70ce77247f95b00a7a966b17fad5806d6bc385a5
-
SHA256
259ffe7647eca25899ea9c6551c2a098d9f91eba9184aa5f2aa825e7937fe827
-
SHA512
26d2c62ee595489c4470fea48461bcb8e1bf41006378fbc3a5727c757bb0168a52af0b0ad71ea3a36f83850b9180e4812d3ca1c4b7fbd9b4f3aabc3d5066d693
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 2120 msedge.exe 2120 msedge.exe 1040 identity_helper.exe 1040 identity_helper.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2428 2120 msedge.exe 84 PID 2120 wrote to memory of 2428 2120 msedge.exe 84 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1320 2120 msedge.exe 85 PID 2120 wrote to memory of 1380 2120 msedge.exe 86 PID 2120 wrote to memory of 1380 2120 msedge.exe 86 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87 PID 2120 wrote to memory of 3516 2120 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6e6ce4872d8390c70399f5b3c6a2ec46_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12ef46f8,0x7fff12ef4708,0x7fff12ef47182⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15613143936515792743,747946198171563691,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD56dcdb659f8439a9a7991c29d66e462f2
SHA1f78a1782e13fd6179a07b5a3addb3535ca6922af
SHA2564ac2af222f0a2d0fb362c180789e07bf6d505119d366179149751ec8bcdf7c0f
SHA51239e766543fa1abc17d374f4bd9b9268786df4a009489cdd16e0bec843c9cb7abe07c1755c2c656aa3d64f02e00b205d0a916772d125ccafcea28c9c9accd6778
-
Filesize
5KB
MD590353c476afacee5874a67daf12ed628
SHA12d15f75c405a31868ccc3592e6f1bb0ec4d8da56
SHA256e2609a7a9d487c5887725a375c76c3067c1522bcc3085f69d325659de9823c94
SHA51242091ae26c0a347e5794563805daa5f406987310e10ddcd5e68e9dd526b202bd749262cd51590bef60e542654d07ffa65d31e666dbc1c19003cd9ce692441534
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51e806c81e326a8646863f000a9151435
SHA16ba44bf63da6c8b90c2d7d65c48e2efe34217e04
SHA2568cb9974fd68e073e5ed8a3d31e3e0dd94e967527fcf75f276af00887ce714110
SHA512de285a969ac0eed69a4fb332cfd357c996d03d8c166817b3af7e7f26d1e2623d184c61881cb39001fbe326203ca8bd821aed421df685f9fc6961a23efaff11f0