Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
b6091f62c7956cec3a819958eea2a6bd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b6091f62c7956cec3a819958eea2a6bd_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b6091f62c7956cec3a819958eea2a6bd_JaffaCakes118.html
-
Size
103KB
-
MD5
b6091f62c7956cec3a819958eea2a6bd
-
SHA1
85379c11b62340611a00270bcc823c927c0246dd
-
SHA256
565bbb51167e7c62d3b3cec43051adf2bbab2eae1ecdf6d3347ef9b22f82c6ba
-
SHA512
60e6d50dae068c9b5660c6288d3b49c3ed28a34b2a73fce6827561862bf646fb430d0112b763a830372f3b3ee1ec85752ac42da6ca37908824db3f24a5013cf5
-
SSDEEP
1536:dROsegjvw1LLo32LgJhiOLJOvsS+XJJII5cHJIUIII5011Aye1eIeIeIeseIe/eM:dRxj4IL4Z4AiqZ3fSxiR86hg+l1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 3096 msedge.exe 3096 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 2032 3096 msedge.exe 81 PID 3096 wrote to memory of 2032 3096 msedge.exe 81 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 748 3096 msedge.exe 83 PID 3096 wrote to memory of 4952 3096 msedge.exe 84 PID 3096 wrote to memory of 4952 3096 msedge.exe 84 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85 PID 3096 wrote to memory of 536 3096 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b6091f62c7956cec3a819958eea2a6bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc825c46f8,0x7ffc825c4708,0x7ffc825c47182⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 /prefetch:22⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2376,9683186423237282057,16423268993759492106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:4556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD500f169cbf883ca264e032c9222a8b2f8
SHA1de209b15e4fd3cdbeb1a7c83eef4d7b6d07b4d7f
SHA256d933bdb07aaf097e7449925ccc0c815076861ac15fff10d137d93ffa1d1ab797
SHA5125ae1a2cd1ca61017814c37c5fa8edc568e6cc4006912647fbc8f61935c5ec53cbfd1d4793c44aab3350c1bc74fd4678cc10847fa940b6f7a6c52b12c7c0bb306
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5799a246b9c49dd09a7b8eb4f85299751
SHA106d9a1c3613dffc9f3a28831d9dd8ea82c2b509d
SHA2567b3b9f005266f95f5c2e92b455f02c5ee10f9a18f7ad9eab8b53f660405fb4f7
SHA512e4e4eb2eb730b03bb56817b0af0e9422574e900dd61b92d4234bae31f1a277c34e6ce11f993f016548dfdfcdc6addeb1799818576ff209bdf026ec0d75806442
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD536816a9699dece84300e8108e7a29a1c
SHA16479197f0cf721fef2ea62f18ac3f358c1eb994d
SHA2562eb50207e1528b8ddf0a99410de2c7dc598fe61b5cf4a7a0808ead12832b115b
SHA5120eb568544f1890ca10d6c06020fbcc1ff0d13342dc7a98776f208d862609e13b86fec81f97329ca0f32bb49d33d337608abbb80c396de152d53c6530919e31c9
-
Filesize
6KB
MD5c8ff356bec84af39b400b8ab4ae88b61
SHA1a6924f29c38c1c739116bb88b43a4df5910181fd
SHA2569338c9ff6ef8ec768d8923ab617b89a9c036cc3013dee5cb08ae1cdda7edb8ca
SHA512a05729b2182a55bc17ae51c73ece5516286fe83bafad35c338f72ed36eeb44c655e72c372e025f2f29859d410c6138af7cb2a8860d54b20c8a01e75dadcaf37d
-
Filesize
6KB
MD549886b945183e2c187a2e861b15a393f
SHA14ede52e3738b52d6561592b67dcf6691514e44e2
SHA256155fc5440c2325790437b6c9a90bee65c71eca91e3b0a64847b67eeba7397da8
SHA512fbc8b2935caf590eae2f1320dd783ee03b67c1192f80ecc7bb3e7b29f6fd66f5713f05d8875510feac61a611dcf924b589c699aa8ebd94ed672c1e2db4eb9b65
-
Filesize
7KB
MD506b29ce877d70f456a3c417f83c8939b
SHA1c5d6a80e26514dd23f46f3ed96ed6c6b6c86cb3b
SHA256c8920dba9f85333001484f0a1e42ef330852ac608438d3d6596b9295d41421a9
SHA512ff86889afd3a4e2155fa1cbeb36b73022bd9dc7475a64c1b8ab6615ee4b34ea236d24bfdea42dab96ad30a8b9041ce43551f0d0ceae34e8074f4db5e835c90d3
-
Filesize
11KB
MD58c03dfde1ba8c3ef6ab1fa00e3e3369d
SHA1fa1d041049cdfef98e9a7302112ec28101f47864
SHA2563f0f8880c28e62904db9a812a23ee72e8b9c87efae95dcd5b37b66a00800dc2f
SHA512c436af2fcd04af68d1fa65b1f70e764c72724921cc3c6415c98d7c0b4b2ee54201d6b5ff6e38f5a88be62f87803e31d42dcdf23a2b5ada3d5d57cca198ce2282