Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
6f691ed3677b50586707150072db3fc5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6f691ed3677b50586707150072db3fc5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f691ed3677b50586707150072db3fc5_JaffaCakes118.html
-
Size
72KB
-
MD5
6f691ed3677b50586707150072db3fc5
-
SHA1
cca6ba13dc36c86f1280241564149bfde01965f8
-
SHA256
bd14113ec877e145791f7b59076c83a37bc2ff54941cc824e9b7ffad784dafbc
-
SHA512
18a11f1380daca852f82bf0b14a0cbe01e8f8010fff37dbac139a667c5232a3ca84ffab8f8c2a4f3834ffdac2f8ecc8fbf3d5c8b1a9b970513fd161180bf5412
-
SSDEEP
1536:YQe87TkOFaQXk9s/SoaFaB+islu0XWPdCzo:Y/iHXk9bopB+/ouOdCzo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 4392 msedge.exe 4392 msedge.exe 4892 identity_helper.exe 4892 identity_helper.exe 5392 msedge.exe 5392 msedge.exe 5392 msedge.exe 5392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 5044 4392 msedge.exe 83 PID 4392 wrote to memory of 5044 4392 msedge.exe 83 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1664 4392 msedge.exe 84 PID 4392 wrote to memory of 1924 4392 msedge.exe 85 PID 4392 wrote to memory of 1924 4392 msedge.exe 85 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86 PID 4392 wrote to memory of 2112 4392 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6f691ed3677b50586707150072db3fc5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb633a46f8,0x7ffb633a4708,0x7ffb633a47182⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13460211904335712845,10560562394171632760,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\51a5d19a-025f-4bf6-9e64-34170462682d.tmp
Filesize5KB
MD51710549ec53515e3ee917058a080cf08
SHA196723176e8b902f9f08087300642bf6e17f575cb
SHA25619ace4f39b76ceb3bd665df187268df40ff373e02cfbba0fb1deb17ff241e6aa
SHA512fb06d2b5151109df5c5e4de3d4495579561468c785c7d6461e4c43e58264926beb025b9fc1838e3677c7982ee8755a00d7cdce59d2afbfe7c10ac60c0f4ab18b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5278504c0cc3e5694570a0f79b732e737
SHA1ad7a86ac30acad36079c7201b70cd6f40aecdc97
SHA2562a6aba45a4b8885962999240138c5a7710d95d715fe348e4bebc9e3410dca6bf
SHA5128b3edb6786225ccbe6b051dfa32fdfd7b19fa30c718391e930f482c5f5bd03a846660de02775608dd51fb4a7dc4cd080f3fd598f4d8632d9fd7bf16d1e83c0f9
-
Filesize
1KB
MD5b0bb35aff997ec2d8688f2992d429736
SHA143cc79fa1b1144c0a7afb8020f5c022a4ee191c0
SHA25611adb5e49f52e0b65579820485017ffb8d94c9168a28b3a1f3a2459736aca1e5
SHA512bbc05994ac3fe0eace7fba45e1722d0571b613634fb00bbed48e9038d69952b34aa0d7fc908130e557bb89f0230b57d6b861a20160d96dc08639b56212cba570
-
Filesize
7KB
MD5941dd648004251d1b1355da9c1123b65
SHA1ee908a7c2ecf38f50eca774cb4199cff799b4860
SHA256b162e6c237a4224821b9deaa73dc98110ef28e0e077528d8b44a68e653f29f14
SHA512606c3b5cacbf31c13d13ebf4a1cbf91f78f43215649370431e978b2bc77ac98105a9e6efb974a658642c684e5f608afe3fdba846da781520804a8b9743c11298
-
Filesize
7KB
MD5532f70351b270c07d7b89080ad8d1520
SHA117f6daf059adfcfb1f10f410b083dfbe509b9703
SHA25634f51bd73cfe9a5223adbaf69d297bafdcea44b43b467f627571d920c5681a63
SHA512b353be41022aac23d18e8b0933df9ea6b18c81fab5a721761b0af672c96d2b7d770fafd0cd2368152c40406864a8af43072dd78e9b76525c71a46b0102823ada
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cb982f7d40fadc0896300884e7c2fb6e
SHA1844ece48ad1587a03ca1cb47e09fcdae270a3ca5
SHA25648486b752461b0cbf2c54e6db0d7b460d1f2213a4f3468c15d1373d26f9fcfb4
SHA512074430f66d6f0a90207d260dcacc5eb1afdfde0e06a62a4d3ac08c73e1823cb1faa94624b373c0c290d41516c9e3a2dbb74df31c9a9c5097f4c7481e76071d36