Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 22:39
Static task
static1
Behavioral task
behavioral1
Sample
61299a9aa7385d3a0421b08056c2f373_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
61299a9aa7385d3a0421b08056c2f373_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
61299a9aa7385d3a0421b08056c2f373_JaffaCakes118.html
-
Size
36KB
-
MD5
61299a9aa7385d3a0421b08056c2f373
-
SHA1
13e13f9985b3ddeea3d97b75b472b995ec9a258f
-
SHA256
024cc61378a0058dde198a065524138256b91aaf50c647e79d6e69236cdb93af
-
SHA512
7e73c3f8a77446cfab790446b24f07e76a34ca5c665fd1e3abfd49e1d03fc7092c7127754a8da40ea2f738d753e5536582623a3d7d10a213414c209ee0ede21f
-
SSDEEP
768:zwx/MDTH+g88hAReZPXBE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TJZOg6DJtxo6qLo:Q//bJxNViuCS+/E8lK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2592 msedge.exe 2592 msedge.exe 3460 msedge.exe 3460 msedge.exe 3088 identity_helper.exe 3088 identity_helper.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3460 wrote to memory of 1280 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 1280 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2824 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2592 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2592 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe PID 3460 wrote to memory of 2784 3460 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\61299a9aa7385d3a0421b08056c2f373_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae94e46f8,0x7ffae94e4708,0x7ffae94e47182⤵PID:1280
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1344
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1616
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:1820
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:3552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:2600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4651158838314981539,3742924565239806081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
614B
MD58da610e66583c57813d5da078fe29424
SHA187027546b3b9a1448ce3159aa970bf43034b9609
SHA25620a19ee8588cbcc8770176fd64e0ca3a3b9a75042e1e9b6ffa63a8dc36fda01b
SHA5128e855caa0b2aee9c35660115e1af60c9c621324816a6f8c761e31b0d87320da0a82ce7da6186ef748d30d3ff9b8d66073c208b0a219cc31a2667d4457883c37c
-
Filesize
5KB
MD549380996a4c7db72129fc9ce2264f824
SHA1d1f4983f1b36e9bf8a082ee54a78d7f33d645c52
SHA25654c478dab7e1ea960fbbe468f52becd8f3c85b93c0e895185dc3d9e8f84a325b
SHA512aeeda5136e9cdda4fa5b9c247f7ca94f70435b1de381da3b6d5c1bcf03d12ee3aa1e1c8c87fb9fb1df6850f23d9843125b1aab216eac9b3b590fac23dd3202a0
-
Filesize
6KB
MD578c49af0407f5466693d279e80152674
SHA18d3f2c3cd2de7e09a0155e29e3f450db30d3223c
SHA25697e2390b982b7cd26cae416e1133f0c70f1c5f605e887be0ed50bd791564e2b3
SHA51293a4d0dad06736a159e5434c882a7a17d181421271cc19234c7f87f1c624e3140ab93909c95ceee17ae373445777ab0787d1af9ac342d3f608dfe357fcf11652
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54ed1b33acc43e7afb4dce7df654139fa
SHA18b5d4616cdc67092cb1fd0fa886271cc5d39a27c
SHA256b04fcc02b1c2a798ec067f7ae50d46cfb2525f9167683366596de27df6087e18
SHA51259424fec55365822eaab035d9943aa9bed1a9bffaba565ad470fa88dec28382a7d1df2ee46bad3e143111582749cc956cddc6c4bc3465963fef04d4120e53ffd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e