Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
6f2264d38d32082f7ef8a9b6909fe881_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6f2264d38d32082f7ef8a9b6909fe881_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f2264d38d32082f7ef8a9b6909fe881_JaffaCakes118.html
-
Size
18KB
-
MD5
6f2264d38d32082f7ef8a9b6909fe881
-
SHA1
cbdc03c1a1979d366aa611dc2adf8adbab3929c8
-
SHA256
369f408158d99c0379764e616f3634dd67ec7a45d730fbe28563225d495a8563
-
SHA512
5d4d3c3ce6e216092dd830d7890aa18cc3cabba858462dd3fdf65327ae552d27ec96467592b9a077697574e04eb187d195a4d312edfabd8e4e0ad2bb23485580
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIg42zUnjBhyk82qDB8:SIMd0I5nvHLsvynxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 1300 msedge.exe 1300 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1020 1300 msedge.exe 83 PID 1300 wrote to memory of 1020 1300 msedge.exe 83 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 5016 1300 msedge.exe 84 PID 1300 wrote to memory of 2372 1300 msedge.exe 85 PID 1300 wrote to memory of 2372 1300 msedge.exe 85 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86 PID 1300 wrote to memory of 316 1300 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6f2264d38d32082f7ef8a9b6909fe881_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f78446f8,0x7ff8f7844708,0x7ff8f78447182⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6851579693513728556,5386352053480782640,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,6851579693513728556,5386352053480782640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,6851579693513728556,5386352053480782640,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6851579693513728556,5386352053480782640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6851579693513728556,5386352053480782640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6851579693513728556,5386352053480782640,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD595be872953c2c17ec7d07e9add5319dd
SHA18420f69cfb14df3f895688cdbdc08b4e448f426e
SHA2566e1c0f68b98460c8476af0bafdf89ef6441f8bae592b50ef04c10f621238b9d9
SHA512ca941e0fef44d9215642a8f68ef81c768da8d812a132dcdb153c0962a49103b7eaa909a2d0801bfa766cd4919676127255432052aa0d419d77db580fb73b95a8
-
Filesize
6KB
MD5cb93c99fb4613d23852fea0b34f3ae84
SHA1ef65cf6519dba2a4e8d6e0dc131ccd2e6d72bd1b
SHA256700c07168c4759fc496d6707e931c353c21aee1d82a654bd91d093d0fb21f95d
SHA512486dd891244f93d3626ed5c5ec2e469167840fa6758b1420b1c67cfcdd44c19ec177c964b0c628134db8d7b07c712f3fdcc460f09c3fe1ddabb1b4695f57a9b6
-
Filesize
6KB
MD549a6ad4e45bc042e4f513561c49374b9
SHA1a1711128d76f437668235449dbdb79302a3edf19
SHA256a7200f2de6de0a58ca4cd2ea9ebc7c037e45ee59ee03921bfc00e04933b1457c
SHA5129ee830a995df08fec14162b86afc5bbe67aa74350bebfe6ba18e58f9ee2b4fbf0dc8aa8e41569b31d71edda375539ffdb38ff05a7bf0378e2f7e2f5f8effcf62
-
Filesize
11KB
MD51802183bae391d31bb034dc3bb34eccc
SHA136e37c8c7bc8da48387f8b27269115ed9ac97f8c
SHA256328075bfd4e181fff0a4e171baf85e5a3b8b654c618d175c141355f6b929f95b
SHA5127520e3d8fb9cdff0119c278fb68b243bda4c994c4aaf779969cc69f4818964245c00f9bc3873f08b092c606ee4ee208129d8982daa777d124a49c9942ff0aca6