Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
6ebe38dd9c8aba6733a54a84fcaf28b6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6ebe38dd9c8aba6733a54a84fcaf28b6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6ebe38dd9c8aba6733a54a84fcaf28b6_JaffaCakes118.html
-
Size
474KB
-
MD5
6ebe38dd9c8aba6733a54a84fcaf28b6
-
SHA1
eff6458879cb5fc8ded6ca00a5882d330b50d8ad
-
SHA256
a0f7326ca7b3166875fe067b0cd656b6db478dccd47782c3cf7e11f480c9d540
-
SHA512
7bc526e633172b0e6bb7dad2f7a97832d86d252fd2b1129eeca0916560d3a00f7095b0a1a1e6bb18f4e39f7c440e9cf4493fe9e30fe1ca1822968b66381a6a38
-
SSDEEP
6144:SNsMYod+X3oI+Ysa38eaqUquyHQcHC29+F6HT4ACpYU65aDCl:i5d+X3dfUquNcZ+IT4ppJdg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3308 msedge.exe 3308 msedge.exe 3644 msedge.exe 3644 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3644 wrote to memory of 4552 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4552 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4020 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 3308 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 3308 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1284 3644 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6ebe38dd9c8aba6733a54a84fcaf28b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffc074f46f8,0x7ffc074f4708,0x7ffc074f47182⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4104 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8850069844310581610,4666028148328330604,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD58f29a52b9205726bb8309e8cb34c98a6
SHA1f3c7804e6eae4cf5e8c7b3cd02ad867fcbdcfbfa
SHA256449fdd9854dadc0db07778da9c9d33c77b17ee19d587c19358a24c5792b6505c
SHA512b9d43782baec6359b7ce7ab9cf56945d06ff0553fa587810935d6e971d9099d5e6d6f52273c017ee87ddff989e2fa482b75943bbf5193500599e4dac5d6dbe04
-
Filesize
6KB
MD50ea1b11e6e44eaf1da2759ed33bc228b
SHA16322052410cb8872f6eea20746b32cf399550851
SHA256a7b6c00f38635ec662357423473334d938c96dda00f175114dcea76790303c96
SHA512a11cc30c0a224ab058a79f9712f3a381202712c95aebb19a99ac3dd87d6b75142352dea12049b1a2f113833f68af576395d3465eff67a6c4ba0858870ba66475
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD590fc5ca2b96bc2d7e0185b00554cbd79
SHA19822d33a9596e89eabae6f3ef27a63e7af772dd3
SHA256d4496baaac121fe4344bfc8493db193834013354b6b6068708616459c585196b
SHA512d6ea652954d0a27f3058c6281813f514cd644d1e8ea7a16b8460cb6a9427dc36556c5f8aa765b5059be3b2a624342cdc623829933a4ecdef9a4d00fa695f6c3a