Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
6e6006400294e208e6ff829d1ca5e44c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6e6006400294e208e6ff829d1ca5e44c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6e6006400294e208e6ff829d1ca5e44c_JaffaCakes118.html
-
Size
155KB
-
MD5
6e6006400294e208e6ff829d1ca5e44c
-
SHA1
6be1b931dd0de356b0c4babe41dc5913093ddeaf
-
SHA256
a9d5c0cffe233b1c8b461d81d36e85485f625a490ee94341b39b02127e1f48b6
-
SHA512
939e26d4535c72b85c24f76b5c9adcb9fc3e9b888df0609427c91458d49a7a0b5ca565ec35a38f6cb86416830fb40c075d777e065637281a9b9f6a70d7e51244
-
SSDEEP
1536:iERTMxwcc/PRVyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:i2VRVyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 3044 msedge.exe 3044 msedge.exe 4684 msedge.exe 4684 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 4684 msedge.exe 4684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4684 wrote to memory of 1192 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 1192 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 4048 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3044 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3044 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe PID 4684 wrote to memory of 3984 4684 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6e6006400294e208e6ff829d1ca5e44c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffca1246f8,0x7fffca124708,0x7fffca1247182⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,164545527343293492,4943786507605525361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,164545527343293492,4943786507605525361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,164545527343293492,4943786507605525361,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,164545527343293492,4943786507605525361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,164545527343293492,4943786507605525361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,164545527343293492,4943786507605525361,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5aedda07b0200769b29b1f45442f038af
SHA1d0cd200357993fcf6dbc19da48c0a848a3c937d6
SHA256f272abdfe4a941a4486940755d202b5a0b92f6de9a101bf81288133c6fc5dd89
SHA5124e28659d8444948338a3f76de4516d56c59bec6cb992f7d84593a9eb66a3dcc4daa71ccd5f03389a19ccd6f7bcee85e295e314eed6ac6403a8cdc62e27feb89b
-
Filesize
6KB
MD5bf0f3e7425c32822e3187f3718335bae
SHA169dbf7c1e4549aec8e0f372b63dd78414370148e
SHA2567a101ee5b796c8a7790e50c26b7f22b512be93ec9f0faee09e2c236efeed0658
SHA5126ec95cc9963310fab9fe3af84e59dac1319b4a850327dc7a6523b1eb99be53b3b36506548eca7ae1b447c84997ca00904cbe5cd99cbea7b4fab87a7e823625f5
-
Filesize
11KB
MD5333d16419f4f04aa8e55ceb8067732d5
SHA1f6ebea9a3dbed9648c7612953fa6d5c496a0e71c
SHA2564459a909c35bd41a4e37ca6785587ca9d4e695578e92a488ff735d1efaad55a0
SHA5125dc5f0d5997c67852c1a961ed178e40c40d4f15fe25f02ac749ccd47a5c9a266616bb100ca45f8addfa8856ccb9002814c430da9a7eee0e10f6f04bc15ba873d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e