Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
068b91faa24b0f6bc7148c769f192ebf_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
068b91faa24b0f6bc7148c769f192ebf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
068b91faa24b0f6bc7148c769f192ebf_JaffaCakes118.html
-
Size
13KB
-
MD5
068b91faa24b0f6bc7148c769f192ebf
-
SHA1
4e99ac50edb18a74af77d70d79431c2ff8a63205
-
SHA256
e8b419edac320b24f384f8ef936aecb381833f27b0af5c3cb0a9cf81039ae853
-
SHA512
ba2f861b605887c8e2a5ae141f4ed88cf0c1dfb08d31eef1667ee401e3483335e7f3a08db7e2199538b993e21ee3e0f6108a85944f8be46d8e76fa6806e2691f
-
SSDEEP
384:cCHAY8Ii4Oo+zOoO4Q5naOo+zOoOmsKPxZOo+zOoOms2HS:cCHGcwy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 996 msedge.exe 996 msedge.exe 3468 msedge.exe 3468 msedge.exe 2888 identity_helper.exe 2888 identity_helper.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3468 wrote to memory of 4048 3468 msedge.exe 81 PID 3468 wrote to memory of 4048 3468 msedge.exe 81 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 2116 3468 msedge.exe 82 PID 3468 wrote to memory of 996 3468 msedge.exe 83 PID 3468 wrote to memory of 996 3468 msedge.exe 83 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84 PID 3468 wrote to memory of 3032 3468 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\068b91faa24b0f6bc7148c769f192ebf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0a6a46f8,0x7fff0a6a4708,0x7fff0a6a47182⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3207851527523757511,6298762551842262202,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5acc6a07d7c7bec6b21c2638645798c69
SHA19a21c9e1b34bafdf8fb84d9c4b2d5186135e4ec4
SHA25636db2bd0144ae866a5daec809d8225b649ac826fae3e38277d6447f0bf2ff758
SHA512e8c3fb9b24b31aa6f4b3d37681650caf4b7fb7e2aa7ac4433f35fc0e500eb844fd0b9005c68784abf13dad41e2e26eaf3333b60e65cf59f7b3a65fc47d77c259
-
Filesize
6KB
MD5b5e5a9e2aee17de0a61246435e6423c4
SHA19821ca05ced6fadfc7c36493f26becfb66de72e5
SHA256d71a950a8b437b88a8237b529f180fd743b5a8aed1a20f3456b1d39c825092bd
SHA5123f46473cf92b0bff848a0684cc79e7a6b28f05bd6c84b1428795d32aa68987ba3bfd5f360b18cd88a701916667d9c4fa368fc6648668fb151736f0aa669f3584
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD541abbfe7f1d0bc46ccc342ef2f32685b
SHA112a85bccf758fe90fbc575233f3e49257747887f
SHA25634a4e05664f09e834abab8edcdfd82b17620d99d7eb0495e9bd1408e99a0e2c2
SHA51248eb5ab9ebc9c78ca39e1e2cbe698d3f0297228d364b885892a98d72833dbad7ef4063c176ef6187e2f2f67f8ae079644a58a10a8692055ec69de0f9ff23fbc6