Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
b61d849a0f4725cd1a494783eaf122c5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b61d849a0f4725cd1a494783eaf122c5_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b61d849a0f4725cd1a494783eaf122c5_JaffaCakes118.html
-
Size
17KB
-
MD5
b61d849a0f4725cd1a494783eaf122c5
-
SHA1
8d31ca4f59e3764e2839e06b905edf6a79ba6420
-
SHA256
c88c4da1553a9be8675809013255fdb1eee91ed1564dcac640b1a2f6694a12dc
-
SHA512
2a041353e98769913a3f96a70ad254494caade9f522a6abbbbc0eaf9ccd1f800bd73bbd6c01c80f2d505a7c1ad011862c672b9be29be0f533ff1bd26bd32d1a9
-
SSDEEP
384:0uMctyFm2TaodSTbpk7oqgo0UhPqWDLPxxTV26:ftuaJTb/yLPqWD7TV26
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 320 msedge.exe 320 msedge.exe 1276 msedge.exe 1276 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2112 1276 msedge.exe 82 PID 1276 wrote to memory of 2112 1276 msedge.exe 82 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 3180 1276 msedge.exe 83 PID 1276 wrote to memory of 320 1276 msedge.exe 84 PID 1276 wrote to memory of 320 1276 msedge.exe 84 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85 PID 1276 wrote to memory of 1428 1276 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b61d849a0f4725cd1a494783eaf122c5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe33b46f8,0x7fffe33b4708,0x7fffe33b47182⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11572219266770639388,13149825020483763148,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11572219266770639388,13149825020483763148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11572219266770639388,13149825020483763148,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11572219266770639388,13149825020483763148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11572219266770639388,13149825020483763148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11572219266770639388,13149825020483763148,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
6KB
MD502336bf0ec7d0fe07c7648d04ce0807e
SHA1e6f4154e618a61bd6b032f821e1789d6d0127a3e
SHA2564f4572d086d19912318a7b1cc61d4561b548bae7d7a2bb5720cf8c197685a976
SHA5125df0a0fae52cd39cbbd7502fa93ac7e1c249a3d961555eff5292b0162ea6ea053d74cb4e4f14c4466d5a5780214b167fe84349a6db9ef44998b10b3f38689d3d
-
Filesize
6KB
MD56d204ac99df58dca7c41399871a65cd7
SHA1b3f3ede7ce7783af614f3cce3a3dd7b0722b22f0
SHA256164797620586e915b0266a7fee73f9f818504f23bee861d1cd7a719251da2c31
SHA51209b11d379a43c7a475c72dfd7b6cc32332a04a8a6797ed3e71a7521bc3701f6566581d80fac18d829d8d14969e24681e5c629c290953dfbcc143f22195e4c930
-
Filesize
6KB
MD5555483ff28e96972fd8814e1d709965e
SHA1da2f8a6e22c889e0be9af88c114408514c9cdf45
SHA2562bba0aa590665209e756c5264819e39052f47d8e828a108a80ca1e59e79f1973
SHA5123e7689c564e7f22ef222c56feee282347c965a9b60f6d3143cd0849485ea3d85b6e3b05cfe25dc273507e0cd8a879cf0775ec34dd6deee3e0cf68d2ea81bfe98
-
Filesize
11KB
MD564ce128feff249b156ed580b3b911573
SHA143802219a4a2daf6ccaceec1dc6df808b7518265
SHA256a2ca399c3d8ae6f926dbd9dca254c54571bdf7c75af25d642272538e14ddcc42
SHA51253f9630d99973793383d9a86f8e53285463763f9a31a21d1106a652b51918e6438eaf02a5311aa5c7e81fd65309b00c5cc66ac855d1a8220fb694bc4d16546b4