Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 08:40
Static task
static1
Behavioral task
behavioral1
Sample
6af380542bd427b848a76187a7cf611f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6af380542bd427b848a76187a7cf611f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6af380542bd427b848a76187a7cf611f_JaffaCakes118.html
-
Size
93KB
-
MD5
6af380542bd427b848a76187a7cf611f
-
SHA1
70278082584e72921a914989bf2989b90486edda
-
SHA256
60afbf1246b7ff4d0deb52ce8d43d16e8366a09567bdc0d4c04c130fd43a6ea9
-
SHA512
80c1ced9a266c2b210f43c4aa418bc6b4de47364d3605e04a58795203559e69640306e6f9c6177c63af786f0f5758ae25b315480af335cf078524374f466df0e
-
SSDEEP
1536:P5rC5A6CznpQpQTmS+z9iTyizQquDtVRF3yd2J4hlsKj16peUWGBGd1vAJikKhkb:VTnpQpQTm9GvQZDfRFCd2J4hlsw16NGG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 3608 msedge.exe 3608 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3608 wrote to memory of 3596 3608 msedge.exe 84 PID 3608 wrote to memory of 3596 3608 msedge.exe 84 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4596 3608 msedge.exe 87 PID 3608 wrote to memory of 4044 3608 msedge.exe 88 PID 3608 wrote to memory of 4044 3608 msedge.exe 88 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89 PID 3608 wrote to memory of 1156 3608 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6af380542bd427b848a76187a7cf611f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8001546f8,0x7ff800154708,0x7ff8001547182⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17500011439744928019,5827049619807081001,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17500011439744928019,5827049619807081001,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17500011439744928019,5827049619807081001,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17500011439744928019,5827049619807081001,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17500011439744928019,5827049619807081001,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17500011439744928019,5827049619807081001,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17500011439744928019,5827049619807081001,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD557959e89330d80aa5485deb6d81e533a
SHA1e11af9b39da15860a1c3153926138c544eeb5ea6
SHA256871c852729758bdf3289f249c800b9118d120d834f7b54f1f4ad127168bd00e4
SHA512dc45ab4bb789219cf65f2aa06bd822c0e7defd3030258829ccb94ae2df7771cb015add95141779d204e13d6843f8b6ea192daaa6ae51c2161f757577c049f28f
-
Filesize
1KB
MD50ce7f6d3cbe3777faa395e473f44a677
SHA1d988fc4c59fe6791692f1daddfc48f9340f2b296
SHA256eabfa67ca86056a4c603edbac46902092cb79c55a82b7624e1151235ed8af00b
SHA5124d77f1bda36c952f0e255f4f4dd38e6ec1cd114717594f344446570739e187ecc6047c2eda71559f506bea7634fa1f24b5ed21b7bcfac260783a0e780484a195
-
Filesize
1KB
MD5f5a7258ee087aa98ed1e6963ccafe4a8
SHA1be054b627032c7c9d0674655ecdf490c2a717d43
SHA256098ce98787ed389444d3d8de5e7612b5068652c3c654b17a559c5651d16eb88e
SHA512de596ebf6aa5dc9ca816f76f6009f6a622a217d9e917fc0d359dc343eb994c05a5093caf348addbae8c1ee18cb0eca4ca83c249d079ea6c12c903bd4d43f717b
-
Filesize
5KB
MD5f41aa547008636a2f9f21d0ba05c831f
SHA1ba87b58b0c1fbcc67492bafc66cde58557b4a033
SHA2567f616ec19262f70865dc1a57db574c6b32fde8d314282fa68598dcff2f25e99c
SHA512a2c517d61377127c994dd415ffc65d341fa9345c329d6d8d083c432796819e0f4981c8207f3c51c13bf10765bb06b43f873aaa0ab57ff916e5d930b2c1f87b7e
-
Filesize
6KB
MD5d25d7747748dd32ff1cf0fa211e713cb
SHA1f171dd1194ff6f22cd03ac802bce20032fbf73e0
SHA25650e8a52f57f9505f47c7c8c5a9509667ba0363e91bd736da4f5e2a5f5f0ac817
SHA512c65f7074aca70f03e99c88529db008b1ee78ae5e2daf769965f4f43d7f87277b0513553b890598b8c15513a631203127bc7092cd8f3e530e391dcd1dabbf1e2b
-
Filesize
10KB
MD5b320797ff9822a4486171e8120b9880d
SHA1735b09e48bf7c39a06d36a42fe2b020f9f322d78
SHA256909c1b6e509f31f4d151cb67161661e37a109c3036d385dc3a2b5802068ab66f
SHA512e1b6c4e04f3560df112244b0e49814fc6c3f82942831c455be0860db4285afcb550b09992ee9c00ff6b291577573608c0f27eddb01fca0cd408f22a28b9c7441