Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
6edb06f931395a2f831ca516d0e89c58_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6edb06f931395a2f831ca516d0e89c58_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6edb06f931395a2f831ca516d0e89c58_JaffaCakes118.html
-
Size
94KB
-
MD5
6edb06f931395a2f831ca516d0e89c58
-
SHA1
18bab86457443fc6c06766d28cabeddad3acae34
-
SHA256
28b8330d921e8534916c948f491d292e0491080d7d1f7dd3df4ea18f70e56ba6
-
SHA512
c6cd55e02e29b7396af721cb2a5f55270aa0513692a0d513dcba47468f6d2e3639befceb25d52bce14d8e6f2ff68991b2e512c7a404d127082ea4acd30162c8b
-
SSDEEP
1536:WMLiNigGf/8OomMi4CK1tDC1s7LyFL8DRwWZ3y9BdkrY8mgHC+qpEyW:WAiY1NBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 5048 msedge.exe 5048 msedge.exe 2916 identity_helper.exe 2916 identity_helper.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2508 5048 msedge.exe 82 PID 5048 wrote to memory of 2508 5048 msedge.exe 82 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 4956 5048 msedge.exe 83 PID 5048 wrote to memory of 3932 5048 msedge.exe 84 PID 5048 wrote to memory of 3932 5048 msedge.exe 84 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85 PID 5048 wrote to memory of 1216 5048 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6edb06f931395a2f831ca516d0e89c58_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ace946f8,0x7ff8ace94708,0x7ff8ace947182⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9546909637491180713,210620764279664973,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
178B
MD5efb3e41ddcb00d4e436d59962fe73c4d
SHA14b9f2cbd664cf2136cd6966774f9ee04b4efa46a
SHA256edc776d59064e412098066a07cba55cbabb1e7d18534e1292d34003961ad3bb6
SHA51285a53139125a0e589b222ebee00d1c593eb24c8059b9f3f86196f8ef346cf7fc988493bb6f5cebf7aec2d0debc5017eff291b04e8aa37180d1ec5a6e2bb362ba
-
Filesize
6KB
MD5e526809e583179fcbecdb7383b30ec7f
SHA18b6aab06fb3fb757a6ace8dd3eb30f577b644176
SHA256c3060cea1c3b26ef8428d66e310731ec2cd551dd9e195abd04a62565de40e8e4
SHA512d9ca83e88f59698d8e70a3541571006a97f7848bb50fc9f5a3d865f88c4b0a350a1f3b923492ba903bfe8db0a949d8ab88547c4890062d765e376206748165fb
-
Filesize
5KB
MD5e87144693541578b8226b215a1d568bb
SHA1af1cb9b9ae9a74eaf062d0eaf34769a65755bcf5
SHA25681ee78cda4569ba85e4cc78a25c1b7e9b7aa9b88a221c6d594e56e613b8ccc69
SHA512b2f383beddc924b7a8e1d1fba0e08fe74325bc0e30301bc1a37edd43e7d5ddd2a30fba826f0be245f1a5267904065e4c453b1d92c2941d24cd30afe733aabdde
-
Filesize
6KB
MD5e94e0abb10c11b79a23640338ba27708
SHA1a4b498ddf66c98cf4d526ad0bcb957d0f9b85ab8
SHA25603e72e18d68ebf03bbda479586cfd2fc4d3138e623388445583fcc4bdd9e4eca
SHA51247c1cfa0212dd8df6e4c747d68d0aaf656f067b92ff9ff7fd4e1d24c40884411904801c75bfc59090ef124756a2ca9f90597385b92cb0e064f168894ed727513
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b5041dec4194e21f87e1729a90a570a0
SHA16af43bed84ea80c0907a300e18887f02ec2e28d9
SHA256a03e55b815522ac65f78a8570a1e624725bf8f3701b113ee0dc30959cbfb38a6
SHA51216902e0cf7149f964cf3c03ff18e6703f2bf573a70090be0e6ff355e519a7f4239c667f5fc65e53d083522d818dd85e5ee03fac228d2e01e334b37f67f536976