Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
6106f8811fd61849978f395c998cade5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6106f8811fd61849978f395c998cade5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6106f8811fd61849978f395c998cade5_JaffaCakes118.html
-
Size
208KB
-
MD5
6106f8811fd61849978f395c998cade5
-
SHA1
558eb88c4ec5544ca19cfe65de2eb2c7be0769b6
-
SHA256
41f37e95f40fb637af9eb752dcd6ec44503141b6b86dad46030b1084ad22ab8d
-
SHA512
120882151f6cda8713456b4f6f6b8ab313ff2473160d914742aa8d836a47127a74b2c2e4e96d65c8a1c8b994aa560c3fa876eded350e754c4a559488b2d60db1
-
SSDEEP
6144:XzNpMppopYFzd6rL8wQvtKfpzOm/P/UWtBUuQiCHVptnpvyglfz4Va+tMLrFWj/H:jNpMppopYFzd6rL8wQvtIpzOm/P/UWtF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 4420 msedge.exe 4420 msedge.exe 2832 identity_helper.exe 2832 identity_helper.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3932 4420 msedge.exe 84 PID 4420 wrote to memory of 3932 4420 msedge.exe 84 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 5052 4420 msedge.exe 85 PID 4420 wrote to memory of 2988 4420 msedge.exe 86 PID 4420 wrote to memory of 2988 4420 msedge.exe 86 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87 PID 4420 wrote to memory of 4384 4420 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6106f8811fd61849978f395c998cade5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeecf046f8,0x7ffeecf04708,0x7ffeecf047182⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4052 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,14264450425175571515,3635086340556196748,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5472 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
1KB
MD58dca4a24f5a568dd92c4df3ae38c9dfd
SHA1fd13c0719e0e177a33895ef36889d2c13bb4401d
SHA2567519a07086abb747091ddcfeb8492e9aae7535aa1d92a7430a82d5fae8748950
SHA5123474daf1c34aa17689318667b18ab3f9a46cc2257f3beb7091dc69ce2d0879e1d1cbdb75c91a0cbb76716e09da6b80e039469cf4823dbc510d679dda8e550468
-
Filesize
5KB
MD5a5b7a45bd047ab11794bbc86c61e6b5f
SHA16e36294d87e401981ad6be810df77f3b19ae08f7
SHA256c4032d4b62ad6ff0af77784f8bda0318a690b0c3a108124d6561fce2881c8982
SHA51248ea4c46e2c843fe90506bfed8ebd787fdeeb78a9e1d52bae9abd56d546d2763d1aa7711805eaa5abfa0e5ed66006bb7b524bd72b665e1310c9897eac7a05b0f
-
Filesize
6KB
MD5e532cecdf33a5dc2be712760db9e1c76
SHA19632025038b13d07bd8c386d2704f654f2955633
SHA25671f5d5996123992d5d638e53e15eaa26a3eabd00e49148b1d24dbee516891a13
SHA51239fda6ebccdff21555aebc8f0ed6354f2dc6f2748099af666beeed470427297d20d502cf9486b12e6ff7aacfc75bd761423d0f1ee4e142723345343dbe936247
-
Filesize
6KB
MD547800829bddaa4143268cf2e19d75fa9
SHA149d26a1005740dccd0f0854c2b838127f9ce4aa5
SHA2568552f86fbbe819c0f33d77b2fdfe48e025f594f7dad7aeb0c1dc4e24bcdb2028
SHA51251472de9140e171057bd0817c154867587970fadf24ed1d90a99750add09e069ab7788e5d7a140604ab2072355cca2cab085e12f81cf9c82ca5f08f087616621
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f77cdaa8aec305c07ccba8ae3f5f4596
SHA1e5f42cfbea2333e8bb41794a848359aa9ddd0007
SHA256f0d1631b821e94cfe65a60d4db876f06955c9efc5924f5a6a97b0cebe7a1e1b2
SHA5124c5ce25f442a931386d7658ec7316c0eaa6086f5f8ad7a943461146f62f70e1b571f349a3ab5b6619499ba68fc30300d81e9b4264e5de1176de5df015ea68c6f