Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
b61388cdf2350131e44461ffdfdfbcc7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b61388cdf2350131e44461ffdfdfbcc7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b61388cdf2350131e44461ffdfdfbcc7_JaffaCakes118.html
-
Size
43KB
-
MD5
b61388cdf2350131e44461ffdfdfbcc7
-
SHA1
d534c030d3e4ffadb424c16790222a577be22b0a
-
SHA256
d7ccb1687d44834bd882da1364c24ae9fdba609c3a90188102bccc0e111724d7
-
SHA512
7645b77846fa4bced83c05b58a3cd2d20a219114e3ce98e975e6c9dcff22a11b6e2ccb212b1c6d333fefb0a83f5030c37ff076f1c3322d3b4e60ddb584bdc034
-
SSDEEP
768:79s6AJ/v3f/qgABeZA/MbFgEKKiAkt+YBEBEhz7oAiCxWvqvCFpxME:7Cp3f/qg38MiEKKpy+YBEBEhz7oAiCx6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 2840 msedge.exe 2840 msedge.exe 1412 identity_helper.exe 1412 identity_helper.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1464 2840 msedge.exe 84 PID 2840 wrote to memory of 1464 2840 msedge.exe 84 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 1048 2840 msedge.exe 85 PID 2840 wrote to memory of 4828 2840 msedge.exe 86 PID 2840 wrote to memory of 4828 2840 msedge.exe 86 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87 PID 2840 wrote to memory of 4696 2840 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b61388cdf2350131e44461ffdfdfbcc7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9984b46f8,0x7ff9984b4708,0x7ff9984b47182⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1720 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13314421032906400692,13853535544938017149,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5ed4b469df9a7940e86b6b931481abf98
SHA123870e3e53e18ff9518f7253168f5dd03144f677
SHA2563fe2f428324ebce6fd67da75cad84434a9bd495de5ea555cfbe12928d05e2857
SHA51281d9089c18e6b594e91c0fe1a9feb1154b2814243588cb4a1583bc161ba90b4778d70a1540d679fb7e0ef814d69a73ca4bc75e69ec6205383066982533ce2442
-
Filesize
6KB
MD5658605da00aa5c568e2559552ba81e3f
SHA1224604a8ecd6581aaf5a2e94db92f4e8982c7cc1
SHA256c6488c5bbebfc9c31b4133189936fadec46ab440f7f8815930b76f495171052f
SHA5121b6bb11693f02544afc9a83eda687e658d9589f2811b11e8fb555e75ff1aabbfcda22500fe3da624e1ef849215f64b6b95ca4a7a347b65bac38919906e90070b
-
Filesize
6KB
MD51675cafb63080cedbd38f79d595e357b
SHA1a84d1b9804d535e5dee1a5b09341b21a05e7f70c
SHA2569450911b81794c12394a86a61612c47264a1ea2bff4b36c80b5d8775b7c7fd4c
SHA512353876310d7ad7190a60d26b44280a7d3df6ae0679a1f9cf3ccad8638d4af502e4cd5dbf2d4e3bf71415e46d6754e9bc3d4bf18a7384729b625faa9b725749eb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54e4faa7f94742c34e855a9bb983506a5
SHA14fd3f2386641ce417fc2a9a91070f16225ec6813
SHA256bb977ffff48df8e321a7c01e89d4150729b9ce7af1583a95aa1cb98a5a5c3345
SHA5122fd5440a007b4502f5f69d653384893e14bd3af1da3926d7baec35b590068f3996c70b71fb0fd11ac06bae1817d9e9671706c619de9f6c211a4152240e1ee290