Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
6f719e117aba9f7e46e6fa234084445f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f719e117aba9f7e46e6fa234084445f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f719e117aba9f7e46e6fa234084445f_JaffaCakes118.html
-
Size
922B
-
MD5
6f719e117aba9f7e46e6fa234084445f
-
SHA1
c221e23180c44c9c41449719b160f9ab576904bb
-
SHA256
434e670219a38b73695284d02a3bc65618ff579fca812523200441217312b8f2
-
SHA512
8be0269830bbed218392517cdbfa29ca66bb527c8dc894503686cb08bcd72cc8e18f4970bdd7cfd965f4400050cebefb6a63549ecfb2e36d7c5200da6900c552
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 3568 msedge.exe 3568 msedge.exe 4776 identity_helper.exe 4776 identity_helper.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3568 wrote to memory of 4628 3568 msedge.exe 84 PID 3568 wrote to memory of 4628 3568 msedge.exe 84 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 3952 3568 msedge.exe 88 PID 3568 wrote to memory of 1948 3568 msedge.exe 89 PID 3568 wrote to memory of 1948 3568 msedge.exe 89 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90 PID 3568 wrote to memory of 4092 3568 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6f719e117aba9f7e46e6fa234084445f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe6c446f8,0x7ffbe6c44708,0x7ffbe6c447182⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10054213683060537727,14913824981483344386,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD51422beba7d26846ada6aff04ec5732d3
SHA161312ec69d59a00ad71fd2cfc09ab2e8136384d3
SHA2564fd4c6809d32b2828168dfdff055f92b813fecf56b05c27bb7a7d4238121e2b6
SHA512264ff08da0551d321f389d260a717b443d788d33fdbb994bafe76cd992a85a7c3b9a27772a5953fe8ae38ab9de479d366a1c94538338af9ab8a81196cb70756a
-
Filesize
6KB
MD5b407d2ba6e1b067e2fed9051ae199850
SHA1a05266338fa7e6de2a7c7b3e60bc60fbd85b61cc
SHA2569cd3f0d7909e610d63a3344ca43f91c2ebb48f9167742ce22e3e858d64cfb29a
SHA512fa062379a09657299aafa5eab5c195f8a4ac8754e4d87acf387842a4ffda88a7e96ff402d47138e4692a667cac2ab9d1814ae122b1b1926d69c718db13838222
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c1d36e008cebe7cf3fc853d6ab44c061
SHA1f6194520b7cc11936f04a70ff84b0f8a543bd16a
SHA25612715eae866c4e3ca3553d3dc1d8cad9949c3adad6e1efea43ea182c1f128cd8
SHA5122215277e18df48e078b03f692ec0c4567e336a0202fd6efca638f18395c797d069835a307e010de53779b14bfe31b5b37925e8c6dee8761e5b462853e43e4e5c