Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
61a15aa894546e5b4e580bd95a57cbcb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
61a15aa894546e5b4e580bd95a57cbcb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
61a15aa894546e5b4e580bd95a57cbcb_JaffaCakes118.html
-
Size
35KB
-
MD5
61a15aa894546e5b4e580bd95a57cbcb
-
SHA1
fdbc7744d9e9ee2a5f5279b624b61af77860e7dc
-
SHA256
b7364e04d5cf2b2ddfe62154c0bb7ba410c0648f0e028cc37aab80672b2f534c
-
SHA512
7f885d1fa7d4443e5386d4fb1e4ea17b509ba5043de7e0f04fac330ad164dab8fbc1e348357498c6f9546b00b88672e2cffa6131c6d6abe44e910b49515549af
-
SSDEEP
768:v9FQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34ami6781DdRA4vEOjq6h8aRlRE:FFQW81D4RA+vEOjz6raAhIaFC81DdRAB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 212 msedge.exe 212 msedge.exe 2296 identity_helper.exe 2296 identity_helper.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 2208 212 msedge.exe 83 PID 212 wrote to memory of 2208 212 msedge.exe 83 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2676 212 msedge.exe 84 PID 212 wrote to memory of 2064 212 msedge.exe 85 PID 212 wrote to memory of 2064 212 msedge.exe 85 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86 PID 212 wrote to memory of 4608 212 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\61a15aa894546e5b4e580bd95a57cbcb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1a3646f8,0x7ffb1a364708,0x7ffb1a3647182⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2196 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16703991772646896879,15200699206263087904,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
572B
MD550baa991b1bbdf05778a0894c565a0e0
SHA1b15d927920a529f68a2fdb58845369d7d60ad7fa
SHA25639e2e0cc6c4caa3bb0eae7353c7dda50d376d1c3acef1fcb21aea6ce0b9ec86d
SHA51292a3bffe689871571a99c107feb9f9ba45155dcccfad6d3a398308e73111c19aa7ae37fe09aaf3b0b05528e03e682ca0a8444de4bab478240311ed72d0edfc9c
-
Filesize
6KB
MD5a8db06021c49cb0d1952a50094d0c24c
SHA15d7c57513fbc5baaa04b5cde8ef4fd9511d1326e
SHA256f6530d4f562b81f92d47623674329b08ae8650c5715f86932ba333e4a74b8cb8
SHA512f295a5f9ddf0008cb13ffdf4cc88f6c9a3cccb00a07ae48a53696843c964505537c5303192e88a042f93901785cb2b8aa907e28b07b97e72feb578a15ebda43a
-
Filesize
5KB
MD58a93e421567747ae284a7af030d8de85
SHA103d3244a645bdf7bd86a39965c46ed1b9e0ce267
SHA256c4fda32fed4ec8c249a5f42fcdc67fe071d98092cc79246ded1be6fb722e484c
SHA51288d6f227e1a80068a36ccbcdfe1aa8bb7f5f0e91c2c34bbe44ac8ccab4fbcc20df25a4375eff69ea9e6835d4d016bf2aed4fb1f79734de3bc331c0e600d8ac1b
-
Filesize
6KB
MD5ea8cae8e1743d31f9a54fb812cdd09b4
SHA145bb00c2647f6338a8751716ac5b590d55243ecc
SHA2564bc3acf9188cc1a1f3d1ac4e7e5732df84e8096ecf446fdc4f700f09b78e81be
SHA5121c7c775f7862b678ab57f35666b7df5755d0a6d40f7b33657ae4c461372ae4c07a32f43adbcd52979b5c4372bad0a1cdfbf68c8199bde1871ecf16a5cdd4d4f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5940507a657abdf25a4382838702a4640
SHA1fc88554d8430385e1e7939f15c22da50333145c0
SHA256fc3a94f2dedb8a2c1a3eb61c8022b936e77d24ee4f2010b957ecf3f7373fb0d0
SHA512ae60d6a40def92f0c3865eb6d0c4e936296e0eb68cdebd514f275e895a0da70fde7aceeccff9754aebef414e840a1ced2194fd4f1b331f38cbd81c9b34a687f4