Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
6f066362efe961fdbaa324c15753a582_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f066362efe961fdbaa324c15753a582_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f066362efe961fdbaa324c15753a582_JaffaCakes118.html
-
Size
6KB
-
MD5
6f066362efe961fdbaa324c15753a582
-
SHA1
897c4ec5af0c7e401ce97b4b0894f215778d353e
-
SHA256
5a11d4c04435e52c07827fc289044e06c4579d3d6625c26fb1b4462a73484490
-
SHA512
d0705616d57e9befbfadd4162a8d992c23e1e010bdb00234ee177b200d18424c87e73fa0f94d0d75bfaec82adaa620fd0b43705e91bd0e5fb78af395d58eb746
-
SSDEEP
96:uzVs+ux7AmLLY1k9o84d12ef7CSTUAZ/6/NcEZ7ru7f:csz7AmAYS/j4Nb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 636 msedge.exe 636 msedge.exe 2928 identity_helper.exe 2928 identity_helper.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 1888 636 msedge.exe 84 PID 636 wrote to memory of 1888 636 msedge.exe 84 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3132 636 msedge.exe 85 PID 636 wrote to memory of 3152 636 msedge.exe 86 PID 636 wrote to memory of 3152 636 msedge.exe 86 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87 PID 636 wrote to memory of 1112 636 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6f066362efe961fdbaa324c15753a582_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3e6046f8,0x7ffc3e604708,0x7ffc3e6047182⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,6446198262170188300,13911413067430826264,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
5KB
MD525a0703ed08e02054575565c02bbae31
SHA1f43b1a8cfa5371c10b13d2969dadf1db400b97b9
SHA2567907475e13760546b14d97c2999c1daddb7abc7246a64d706430adf364990383
SHA512e565f85ce60e80db7dc7d6f1cb7e04a3df21856522b06a0653481dbd36a8133fb63d5c2ec34a8edd9c01923110a8d85b39c4ae1074672a5f50b359d493ee2255
-
Filesize
6KB
MD5eff9bd75fe45f002717ee0e3c11dbc49
SHA1d8be5249ad7cae0827ee56440f5c3581e4519176
SHA2560e249d61202a4d15dfa2788fe9bbb1477a98943002f23b08a6f0878cd1580ba3
SHA512ea0a2340520d41b47b87c93313e49c21b40853edc8c6f0a121b4af7387e1ccc0859e6b7912f9e7baa81bb4a788c953c29a5a5fe5b087229cfde6002c5e1a2bef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5aa37cfc33c37f7d62c46c1c691ce7545
SHA1693fe344e076f790c851187c6ed0f22716b00666
SHA256de0ff7b00028bb9e301b20f776d31470a53bd98dde846adcde2c441c7e76e32a
SHA51245093f21053665385ab7f0beb19a817db84e32adc25d7530488a5dcf3741487b5eb83692e0c3e0960bd39175b58671a4307fe9d9265a676538e6f6e80c6239ae