Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
61ba681b5e266f2ef7ef979e6468b154_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
61ba681b5e266f2ef7ef979e6468b154_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
61ba681b5e266f2ef7ef979e6468b154_JaffaCakes118.html
-
Size
114KB
-
MD5
61ba681b5e266f2ef7ef979e6468b154
-
SHA1
3114996d08786a52f9fd7586b1a430012708c151
-
SHA256
958932d154f7ba478ae38fb0e87329ce7c38fa4421500d3164336ff50407b86b
-
SHA512
603fd869465a9aeab15217bd01a719cf8fe731958071a1861c3f4f543ebfd7ef2211ee10d95b56efff5cf44ec77dedfe3a463dcd0159ce941c1be6ab26422cea
-
SSDEEP
3072:+bVN2jaNEqOcCZ+guEPxN3lDMiM4BlJazBCDqtd7HiBwSndAQx1:dZ+0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 212 msedge.exe 212 msedge.exe 2752 identity_helper.exe 2752 identity_helper.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 4484 212 msedge.exe 82 PID 212 wrote to memory of 4484 212 msedge.exe 82 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 3236 212 msedge.exe 83 PID 212 wrote to memory of 2488 212 msedge.exe 84 PID 212 wrote to memory of 2488 212 msedge.exe 84 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85 PID 212 wrote to memory of 432 212 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\61ba681b5e266f2ef7ef979e6468b154_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd711f46f8,0x7ffd711f4708,0x7ffd711f47182⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2340 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2352 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14700863858014556536,16212013625654315768,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
799B
MD564513a5285e97d55bd77e744f74841a3
SHA1af15691e2a369e7bf2be47ab73a158a5691c5007
SHA2562df1701c91c305b2a570a9a1863ea132e13fcca06ee852868513fd54a1c10ff2
SHA512b4d8141bf7b0c36961bddd629fd7588b3b6c403010ea794f70dda0339f1060a82e65794dd33d92664cfec0141488df2fc7fefe77e449c52eb50d874eb8c14ad3
-
Filesize
5KB
MD5c104126d8dbc884c3623000eac24e98c
SHA18f07f97a32cdfa150c8b371f51782a1f9bd7d4a9
SHA256f5f66d3b8077476ba7c837445891e346243e049f29967a4f9920dfbaec797b70
SHA512a09d1c3d14da86f65b160b4640327bbd56d228d4867a0e15bb86802f4180a02efc9425c1bba0f2601a2bd6417e714f1e063e222ec2481c9c75c73eaba233d5cc
-
Filesize
6KB
MD5361fb7e59994bf05b879296f91cf89a7
SHA114da5f13bb0340bc50b59ed4e26945e3cfec3fa6
SHA256f691cc37d3b7ee874fbd4647a0287ebb6560310a7648077094d525ab209fc8b9
SHA5121b53310de99ec75a1a8dedd4e41c7b38f6892e88fd3fd3924a3f52ad623f8db5058968cf7d32dee788aea52f3897f179e1a877f83a52cb9aedd498f0f4df737b
-
Filesize
6KB
MD5299c8f9defcfd74e7725cdbe3ea329a1
SHA1b22038b74f3cf5acccb444ba8cdc8209cc89ce7f
SHA256583bb899de7acdad21aa9d5974f1cef1f8a75ee1d9ccc54eae7b91d9d3ce1ad8
SHA512de376f618730a8a10849734afb801648b1f0eb328654f57557cab66f3f2b868ab70c855c480e177896577c9b26c88c4400553e25fe28d6cbe72816d8155877e1
-
Filesize
6KB
MD5f92ebb29e337b9bddf8381fae46bdc59
SHA14124c5526e94f52c1867a772107a85fce18dd3bf
SHA256416cb9fbd4cdc9634abfaeb047c25670d02b5ad4ef4c0f2d90caa9329be8a0ae
SHA512894c3e338900301dc7680c8200d6a67f65c2d49f5fa0b0571719752dbfc8fe02ba20dc54ab59c49df119df4ff0cf84d0dc0890a99e07b06c9f560368fad279f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD598c65e612a4443b7d176aa8bef99d11b
SHA1a8dee73ece7389ba2df2eb41c87f927b2a605fee
SHA256d378cf60541a0db65e27839a48fb2469d0ecc59ef0fdb40aaae386411e702fcf
SHA5129f16f5f041e196ef2883c1f9333b276a69416a3d4695da33dd8466b4bb8e4b8105e4bc15c43b0e643a0404943043400317815169c1192e9876a0bba3a19210ba