Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
061ee4ae29c91af3d21ac3c3f0e4a71b_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
061ee4ae29c91af3d21ac3c3f0e4a71b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
061ee4ae29c91af3d21ac3c3f0e4a71b_JaffaCakes118.html
-
Size
27KB
-
MD5
061ee4ae29c91af3d21ac3c3f0e4a71b
-
SHA1
ec5fe6c6ec9a6a2265ed6c1c4a38f691388ed764
-
SHA256
92bd8f0243fd90e04996f0f636ff02a4abd4cfd5c545a6762a336cbcabb3ea82
-
SHA512
e9d99139e2b44073d33eb6fad1d932402da164413aa7c89af854c79dbd509e3c7a8e3cac8ce034a2817c04d99a759d154147a5cc2aab6c6ecc271841efe544c7
-
SSDEEP
192:uw7ob5ngBNctnQjxn5Q/7nQieiNnQnQOkEntFhnQTbnFnQ9eAbam60dO0Ql7MBCh:qGQ/MlemOfSgD9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 704 msedge.exe 704 msedge.exe 980 identity_helper.exe 980 identity_helper.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 704 wrote to memory of 5084 704 msedge.exe 83 PID 704 wrote to memory of 5084 704 msedge.exe 83 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1468 704 msedge.exe 84 PID 704 wrote to memory of 1344 704 msedge.exe 85 PID 704 wrote to memory of 1344 704 msedge.exe 85 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86 PID 704 wrote to memory of 2852 704 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\061ee4ae29c91af3d21ac3c3f0e4a71b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83f2746f8,0x7ff83f274708,0x7ff83f2747182⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,12499026750674051937,6923584267257570125,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2620 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD53d2bca158d1dba2d600788c0aca931db
SHA1e561e9afdbe909d060322536b6f9b7997894b81c
SHA2563f577c998c1c7821f0e136bd97cd90d212c8161c31ded593d36bfc3b6194f909
SHA51286b5bdf821ffb03ffd1cb2eaf71533fb38be4bf66c8a7f79fd24847048feee18c061d12716446fe57025e270efa18510741d42c99c523078e1fbb2a610381ff6
-
Filesize
6KB
MD5aa9018f8eb0d36c1b12da80092d2a4a5
SHA11da1e91a3260271c5c6fd6acf6f6867f6415e77b
SHA256a462e23c597b9b2f1fa2263aad4741a93417dbd1a97912040dd58e3840d68ec0
SHA5129f386d883b899022d1c69241dd429d21626b967ba84a08c6d5df9eff41dbeeda8e581e4f2b5ba25e03bebbefd79f1ad7283cb8d2dc13b36cb020707062ab5630
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5f674fc440e8f0014e3fad2e5fc2e6413
SHA1e8bbcf8f17da903ddbdd2d94ef2138f8292381ad
SHA25641bf2a44dfb6e3f79be66d2da663e03f08c6c52edb398a9596d781799f77aa57
SHA512c84003c84ad503a426e16cb5b352dd25229daad856ca05d54478b4258f8d5782d5ea383bfebf03e34cda5d17a14a82b190ba3c0773560ff4897239123ab8aa80