Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
6f31e1796f9b9fd831f0c0cc7c7a1a13_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f31e1796f9b9fd831f0c0cc7c7a1a13_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f31e1796f9b9fd831f0c0cc7c7a1a13_JaffaCakes118.html
-
Size
8KB
-
MD5
6f31e1796f9b9fd831f0c0cc7c7a1a13
-
SHA1
425345069f1ffa1f617da02a355e93c8a45d93df
-
SHA256
3405ff33c3d27d6b2802f6ee284cfe34a3de2db6d6cc26b0452d579f91195039
-
SHA512
c23df467deff4585f3a4b26fd9977d38ded00c7c129ecf3f2ef8ad088e93d6b9e44c7f9ce8f5c590370f2e79c10801fc22837c57264b2d180fcadbd390f882cd
-
SSDEEP
96:NH7/ve0fMeA+mAtziF+/8v6JyDXX3VolW3isqLFntsql/q4AFmGQGiaXTXiXVXJG:tLdTAYVJyrX3VolWKZXot
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 1516 identity_helper.exe 1516 identity_helper.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 408 3612 msedge.exe 83 PID 3612 wrote to memory of 408 3612 msedge.exe 83 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 4360 3612 msedge.exe 85 PID 3612 wrote to memory of 3252 3612 msedge.exe 86 PID 3612 wrote to memory of 3252 3612 msedge.exe 86 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87 PID 3612 wrote to memory of 3500 3612 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6f31e1796f9b9fd831f0c0cc7c7a1a13_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab34146f8,0x7ffab3414708,0x7ffab34147182⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2327071540625282741,6671408071818187421,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
6KB
MD5fe9792a323446a93ba81f848a0108664
SHA11b1041667da72139e9f699b6aab039b5fcf0a309
SHA2564d4de9bf53492128ac738de5ab54836297f9f7907e13016ac053964d705aa8b8
SHA5120acfba7c3972c422be11ebae4345158daa6238d4dd59a34d5b61ace3897194d7e2ab680f5773a818c5a665bcc587d454da3c11f51c56449ecef18d8840be4024
-
Filesize
5KB
MD594521e1c5f5fd734e31409c3f9681dcb
SHA12d4f3249b8c85ffdef9e6b6d3e18907b10ef26f4
SHA256b0bd271a93098f26b384aa9b9992cd82cf9c65d47dc58686c186272f5a41696a
SHA512fd5dab669727143e817573622c21fa20cfd028062dcad54b660a4e7a7a4fb50e63ea856d77cf10bac616dbfe0051a55f7a162ad5efc162ce2fa3b28403b5593f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5013ff13abe67fcf4ebe11454233bb42a
SHA1c7a74f25d80f9c54434cb578001f33e41f02410e
SHA256a48cd56ac3dfdbaf0eb530fb246955cf43fbe119971c50762074293f76892824
SHA512b5142c18933b6c9496c8fcb3d1c078b8b9a5eaacb34ef0c477e40ce49bc3267e0840708faf8864e81ca56598e5d916108b2e841a3f387a551818aaa333cb9c26