Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
6eb215a7f92c945917e22f253aba26fe_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6eb215a7f92c945917e22f253aba26fe_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6eb215a7f92c945917e22f253aba26fe_JaffaCakes118.html
-
Size
35KB
-
MD5
6eb215a7f92c945917e22f253aba26fe
-
SHA1
182c352e25ac8c757b205ca0e7ce3c82e6fca48d
-
SHA256
f4f9e7999b633c0447399e63f91e5231f0f2710e4cfb63e346d87d3cf6bfcdd7
-
SHA512
db3bce164292ad6c87bf6e2fa5340e73c379dba2f62fe7ea8cc9dfdc514ed30efcb882da0be548baa169d416e8692efd749077df89668508f939178da96bc1b7
-
SSDEEP
768:zwx/MDTHM288hARqZPXlE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOf6sggf6lLRg:Q/DbJxNVNu0Sx/P8DK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 2488 msedge.exe 2488 msedge.exe 2644 identity_helper.exe 2644 identity_helper.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 4764 2488 msedge.exe 82 PID 2488 wrote to memory of 4764 2488 msedge.exe 82 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 1256 2488 msedge.exe 83 PID 2488 wrote to memory of 4620 2488 msedge.exe 84 PID 2488 wrote to memory of 4620 2488 msedge.exe 84 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85 PID 2488 wrote to memory of 1120 2488 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6eb215a7f92c945917e22f253aba26fe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe86fc46f8,0x7ffe86fc4708,0x7ffe86fc47182⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6596801061750423036,13513222011354084060,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
614B
MD55dfac8955df953cb8d349b9a4116d04f
SHA1915908216dba24a7e7f3a0be3ab4222ae6a19863
SHA256efe54e5e7a7a1f707f97f6d12c773be0593728af6f851b317af91ae357bd7bf5
SHA51289001a6d0466da6240909fcbacf9f1502afb4c59dd05ffbd563577cce1966382a457225870e7e0cd04ff04417faf63554ecb5a27d58b3721f11a234627b0b234
-
Filesize
5KB
MD5446ce1a3aac6d228f44df69de0996b39
SHA1f2849abbb36b67dcea2492a38c90c6f88eed3e1e
SHA2560903546fff55aa441c22f897945257e81b912bf990a176da6fcac35e11086525
SHA512ee703bdb1e1048f1149956e2d108b6127691a319f943d4f8f746ac02fd6dbebec7875bb57794a4da69fdc303c43b7a534d3966d5fa97a06af8a0475573e1f08c
-
Filesize
6KB
MD561d3cfa314ec09a713957d3443968ca2
SHA13087b8c796121bcdfa99fc0ff318fffe14b1a3b9
SHA2563205a6758eee27f2bdd3596b7115532168f7a301b699dbb5332759023af49639
SHA5123214cabb844733cf1bbbb32ec670928f8b88de413639c1ff79a7f7c74905e2ddf7bd38c7631c43f907dc2e64a21329836de85779c264232542fdabb3aad0501d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD521393de012ae27097ce0cb32c5ff9535
SHA154aa1c6b82fd30e3dab98fa10fe33e05ea7acd9a
SHA25619f2d9299524ad32b506e14eb9af244d328ac8b3ff4e2874caa1c790e4a35cb3
SHA51266ebe8ec6e86f326646b087d639d73995af53785985bca182a613b925be6f72d8d039de9f91273cdd525b7f1250e0c3478daf60a023fc035a33231d8555985a2