Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
f61ca69fc2aaec04af3f936da6884c6d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f61ca69fc2aaec04af3f936da6884c6d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f61ca69fc2aaec04af3f936da6884c6d_JaffaCakes118.html
-
Size
5KB
-
MD5
f61ca69fc2aaec04af3f936da6884c6d
-
SHA1
638ae56c078e70d101756d354a0b5fd25e91460a
-
SHA256
f558c5e41c2fcb60fd47ca513f34f60b9ea51e3cadc948a34b3f8b41c029c5e9
-
SHA512
4820be721907604e3742ca31fd766535d446a0b232db56a50b834bfdc70e9cc066453691564baf7c4b30e7b3fbbe0f19e766b35ff37273e1bae84b2504d373c9
-
SSDEEP
96:1uM18LXU6luI3aMXWyWGYO8Pm5HrYnaYrVKrwtkaCExGHoQEPd5:T8LEOR3aMXWyWGY7PmJrYnaYrVKrwtk8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 1196 msedge.exe 1196 msedge.exe 3696 identity_helper.exe 3696 identity_helper.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 3724 1196 msedge.exe 82 PID 1196 wrote to memory of 3724 1196 msedge.exe 82 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 83 PID 1196 wrote to memory of 2976 1196 msedge.exe 84 PID 1196 wrote to memory of 2976 1196 msedge.exe 84 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85 PID 1196 wrote to memory of 5084 1196 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f61ca69fc2aaec04af3f936da6884c6d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8964d46f8,0x7ff8964d4708,0x7ff8964d47182⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,408157474610488427,18152965805318522301,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5b0bc132cfb4aacb355ca9db0fd449888
SHA14975fd73087826314eb3b8023a316f0c459fa557
SHA256fb59b369ae72341f84944c470b86ba9d3f64d7a1ca29d5909f081a907592a77c
SHA5125553eee07d3da9c2dbda5c03d40fa3d47a3b708512cb8edc9f64e38ab4db1666aa44434d82779cf2bb4c6f0036e937bf3b185d2cdae488262bea8fde62844d43
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
478B
MD5503bfda6f0d6c07483bd8a6135db943d
SHA1d4038b7fe70f26bb68e98a24c50a5f9fe3d1a5c7
SHA2566faec12f96c5e18c76e42a4b5583b37ca8b96922788584cb481717c8ca71d7e4
SHA512be2c3042f82f4a26dc72a3e49247df6b7d56c7b01a446d9579e9c5693d3671a365219221181e328523cae4fc09d47dd311c7e854d00d96969610f78218a1ca5b
-
Filesize
5KB
MD5d25bd2ed5e27e55f8f3c26166f8cdfff
SHA19761be21fa70f3ad58477c4ce8bc512ded2a0267
SHA2563ed99d6cb6218435a5001a83d3fb4d94889f55b1729ee033ce6d08dd1624826b
SHA51292098693e9ce140e266118f1540b22eb6e3805ce1c824d43fede9211c50862f1d06e59c50493a84e4e5f036ab7a25ec08d359e161bd20b07845c41f535e12fdd
-
Filesize
6KB
MD5cafd92bc71364cf8008a1d7c81e4863b
SHA148774748b6e30cdc39d2fd4118bdc0362b908546
SHA256c0922c7df1fcaa3e763ee8c17ea08bc31fc1bc2c83a7b755e53e8f752b30e918
SHA512330f852f96d3835f575b13bcad0efd4d30500e07824174ed7840a7ce8fb6d586dfa52c59e57f43780754d18b9877458dfb6e97d947b190a37bc80ee5843f8adf
-
Filesize
6KB
MD56aa86a8345f5e514ab1d419ba11a3149
SHA134bc3179d380aaa68366e69845c81076e8f0b5f2
SHA256a71d465766b1e9ed00ffb82db2d26bd77d36352fb4c60bb1ee22c04d6480f294
SHA51235caf6143633356e20faff376d87045a518d1f9d8f58c23079b90aa546515583f4707776c0440f78717853a4aa798d1eb0c008afc358c2de907632478ce03776
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389