Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
6e6e0822c3b58118fce2e498062898c7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e6e0822c3b58118fce2e498062898c7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6e6e0822c3b58118fce2e498062898c7_JaffaCakes118.html
-
Size
2KB
-
MD5
6e6e0822c3b58118fce2e498062898c7
-
SHA1
ab8f41efa20b76aa7c26d1674e9bee4e2b0a1279
-
SHA256
1f8ff490b2b7448b80a9be4ed6bc465df63209b8fb485e2e0fb2b21f6eba3369
-
SHA512
5b921ecf8ee42a30ae84e1a62b0d0cbebdb7cc934655705938d04eb4b4a8f2c4149077d52e271c1cc310379d95aa9701628f9c3be38560fd18de0a4c7ef2977c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 220 msedge.exe 220 msedge.exe 4812 identity_helper.exe 4812 identity_helper.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 4292 220 msedge.exe 83 PID 220 wrote to memory of 4292 220 msedge.exe 83 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 3300 220 msedge.exe 84 PID 220 wrote to memory of 4004 220 msedge.exe 85 PID 220 wrote to memory of 4004 220 msedge.exe 85 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86 PID 220 wrote to memory of 4740 220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6e6e0822c3b58118fce2e498062898c7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb649446f8,0x7ffb64944708,0x7ffb649447182⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2260 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13870654176999434288,14072117372263591195,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3676 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5b127f10673aae207f4826cda85bae9d3
SHA1db927530e455928cfe4f56976118841e89974b04
SHA256fc1f99f284dcf8b12fa6747aad794e6860d972c0fe713169aa6feb716529803e
SHA512d9dcdd27a6c0b91b2b17a5fa31e121129e26d2758fe82d82fb3957375d6b6490b17a29332170200873b9014377e1865fe5377f378cc42c611b590315555ee30e
-
Filesize
6KB
MD50c4435b57e23292378d90237310b8587
SHA1bc668802e3f386e3cca15d877616c215813dd00f
SHA256466303e4c846577bf56d0640bd9561ab9dbe013718c972989526ce73ce2b4439
SHA5129168e6e9087cc09c2c3c9d07115e20e2726b06580b8d2bbb5f326485f2e04e2383de2929a906e49ebaff0925aed5886f94563180b7e03ab8fb0c1345fe776807
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52560b47ffaf03e6586109514413bef03
SHA176240d20ecdd01471f19fc1a2cb78db360293821
SHA2564b4f00799a7bc1987098db5835fc4e4b3eb2e88723726c115f8f18f3384d59f9
SHA512c4c1dbfbf14de313ed5693a174f09c712d0fae0d3d0bd224d89713b48956e3025669bc6dff79f3666b58c8d2283136c61259baad232ea014c88357e4c0e8ee60