Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 08:13
Static task
static1
Behavioral task
behavioral1
Sample
6ddefe6e5797478187cde7cb3e194116_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6ddefe6e5797478187cde7cb3e194116_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
6ddefe6e5797478187cde7cb3e194116_JaffaCakes118.html
-
Size
127KB
-
MD5
6ddefe6e5797478187cde7cb3e194116
-
SHA1
0e8028a85677a4bce57308b65dbbb0b9a8b70eca
-
SHA256
7caf4a83f8d1f95ebea7156ddb1df6f9adff9663d7f43af2590adbd780a97372
-
SHA512
ae602994027d131947f811dbf33771734244d4e9343cf1d798be4e932e7fa8ecc698fa0300601a773377f5758d284d17c4d8d7fb72fee1189a57f8aa1c5f1875
-
SSDEEP
768:2Sk1ATx+Bw24Tp7VDioidNCiZW0HI8Jj2ECFcsm0IXWhCFAmmv1p4ODMtFA6cVxC:2CHDiAiZdIdECZpZDMtFbcDOEtDnJkf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 1936 msedge.exe 1936 msedge.exe 2272 identity_helper.exe 2272 identity_helper.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 3336 1936 msedge.exe 84 PID 1936 wrote to memory of 3336 1936 msedge.exe 84 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4212 1936 msedge.exe 85 PID 1936 wrote to memory of 4568 1936 msedge.exe 86 PID 1936 wrote to memory of 4568 1936 msedge.exe 86 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87 PID 1936 wrote to memory of 4916 1936 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6ddefe6e5797478187cde7cb3e194116_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccb0146f8,0x7ffccb014708,0x7ffccb0147182⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1904 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,418346593182337026,2282338172431475786,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
395B
MD5ce252e48e1647e943b80a2f1617a74d0
SHA1d6dfd942d5e2619e0115fbba1403ff78cf8c1235
SHA25652746b57538d68cad60c13d255bdf8a700810702d51142dff343a855645c2ba9
SHA5126f94c2610dd26e4eb2008f242c7f1974186473c3e474e8085c36d971429e87d3bf92626eb9fb7c1ee238d7728e72251bc033ee684f063505b34a5ffc76bbc06e
-
Filesize
5KB
MD593c97f65b896832347a4e1d0611c65ef
SHA10f94b8612474cb04d12f661fd311b55cc9820ab4
SHA25691ec8be703f329130737a3655f542f1a8e1c3e42172d074bacd9b834a4e1d897
SHA5126468da699d35a8935d0dff41d1fb9221d859e0cc2384553de3ec43f6f265510b4fa9e81e1607c2170024c7842be7f9ce2bc9a01126eb0ee4454032662895f676
-
Filesize
6KB
MD5d616e2d37bd8971f7be3ca7441d91591
SHA15ed4a477c7d1ac99fd78f7aa3b46583316b36f3c
SHA256e5b11e37381cb0ba7ca31b7d5fa02d347fff827abdf2dbe0e155d01dfd2bd16c
SHA512bb6dc83153d48531ed46d1cdd704e38a0a19c6322ad871df78bb3bb7f00b99b87705a0d6ee474fe30f8343c8662deb5bfb8829c7d407bf65035f8475b828addf
-
Filesize
6KB
MD5ecd4b02e184047ce19ea458fd9d31ee0
SHA1c159e044d68b4c18f68918983cbe7a2f897c79e3
SHA256f1be8c5d38bba63da9878ca1b7999981575ab090026ac8e6424cdf5df288eccc
SHA512d88f67cda55716c370f454d5564089c40b530a5cc9389d6ac8d2556f553f7047e204ca996b25ff1632371f8db7e779d21a826e070c30691daf187783100248b8
-
Filesize
6KB
MD577282a363937704c10c0b9a08d864852
SHA163a9f2cca3a19306ecc476c898468915f9546b32
SHA256a0d8848630c165fe5a53b8e8ebe546e667f9d2b6d7705d3798d9c87574f8cb91
SHA512f48df8fedcf2fab94d62c998340f28d10d6f16cbf8107d84175edf497461495806808154e01dc5ec4bbff57844d177e2b9ec57d6d1d36d7b782e42136874f82d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bce79d3669470ddf56756142f6f42eb0
SHA16a182f00726ffc01819ad63a71ec526681cc9aab
SHA25602a198bc7beb0ca67742af0b9e1b84ac744313914b42dca5eff74919672e4152
SHA512177fc78d909d373ee1506c065f10646f1a8f694433f9a00f1ae1f9d8b0aaa0d90fd16f2a94545ab429b7903edfceccce0583618f271af920038d98acf119b510