Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
061f62eb8182583b22420c91b6f996af_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
061f62eb8182583b22420c91b6f996af_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
061f62eb8182583b22420c91b6f996af_JaffaCakes118.html
-
Size
34KB
-
MD5
061f62eb8182583b22420c91b6f996af
-
SHA1
a6a967641a23949cd89a537a80e025d937c704db
-
SHA256
beac82b387af1769847b462cca3a89edac61068087d182d6c113f59c8b180734
-
SHA512
2c1885738211dae577d69cebb86c2e6ce7229d4a258d015059a6bbfc5197a5c71e36470a990627bc97a09f11a496dfc33be7737bf33318d5414c3e5a03ff8655
-
SSDEEP
192:uw3jb5n9KnQjxn5Q/wnQierNn0nQOkEnt0qnQTbntnQOgScwqYDcwqYGcwqYkpTK:rQ/JwJEH++XvuwehasZdTBX1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 1340 msedge.exe 1340 msedge.exe 3948 identity_helper.exe 3948 identity_helper.exe 3292 msedge.exe 3292 msedge.exe 3292 msedge.exe 3292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1340 wrote to memory of 3688 1340 msedge.exe 82 PID 1340 wrote to memory of 3688 1340 msedge.exe 82 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 4612 1340 msedge.exe 83 PID 1340 wrote to memory of 2380 1340 msedge.exe 84 PID 1340 wrote to memory of 2380 1340 msedge.exe 84 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85 PID 1340 wrote to memory of 1284 1340 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\061f62eb8182583b22420c91b6f996af_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90e9546f8,0x7ff90e954708,0x7ff90e9547182⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3797705599532434696,3284338763632810091,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5440 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD53ffa7505b1abc6ed389259b45b0aa543
SHA18d6e707ff5c7aae8d1626e5ec031b367b3623518
SHA2568b9c032e46774e8d98836c7fd204cddd17caea23ddb78c566ea042ed12271bfe
SHA512aa275c55655d50cc0fac4e2c3028783c76ba2d3c0beb330c03a6f750496c54cf7e6114918098246eac951c8a934fc21b0e99ff441588f6dc1eca62df031ea985
-
Filesize
6KB
MD5624685f27995b1de23216bea5e6afaac
SHA1b296e2962776aecd63e1a87df00eb01c0c5bc962
SHA25633c31dd7c6fafb17fda215bb81d06085d0b7b7769ee37684f81dbdd53a666427
SHA5122c99c8a3b2cd30b5e7be07c92801c7136f992a73beeac1b50e299236a7123ed2478f4e7c00852c51d839b49300b15b909ba504e76041de9caa99bc9464851275
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50bb72f4d614f7d6633f71ac7cf49bb11
SHA189c1a6cbf0ef7552336593aaba5b9a2a56d452b4
SHA2564bd197b08ad922010b37593022e4997979fe7923993a73e9b84d71bb0d008025
SHA512ddb6c06b164fdbe279e40ce06a2d13338594b4eec12b9c97d6b10a99524ec2bd9fccb293d2e03e1ec853383ca52f7708681f3f46093ae0f46683d8cf0c870631