Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
f81c78f4c65019c1f5cac5325ce643ae_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f81c78f4c65019c1f5cac5325ce643ae_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f81c78f4c65019c1f5cac5325ce643ae_JaffaCakes118.html
-
Size
3.5MB
-
MD5
f81c78f4c65019c1f5cac5325ce643ae
-
SHA1
ea61dfb306a4855ec95e08919fec9d619bd5c819
-
SHA256
938c127851100b1de48964185adc9a369c4390f11c7ad9a9c7492cb66466618b
-
SHA512
4b539e5840b44877e76021ecbc453582c1adfeff3b474010f8a4c70a8ffae733d671d83e0f9227b9530a674de69541cd1f78f37f3671cdce03892defe51099e9
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NN0:jvpjte4tT6D0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 4732 msedge.exe 4732 msedge.exe 1568 identity_helper.exe 1568 identity_helper.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 1080 4732 msedge.exe 85 PID 4732 wrote to memory of 1080 4732 msedge.exe 85 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 1628 4732 msedge.exe 86 PID 4732 wrote to memory of 2916 4732 msedge.exe 87 PID 4732 wrote to memory of 2916 4732 msedge.exe 87 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88 PID 4732 wrote to memory of 740 4732 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f81c78f4c65019c1f5cac5325ce643ae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ab9046f8,0x7ff8ab904708,0x7ff8ab9047182⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,5930159230117752183,8679313559694646050,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e2ece0fcb9f6256efba522462a9a9288
SHA1ccc599f64d30e15833b45c7e52924d4bd2f54acb
SHA2560eff6f3011208a312a1010db0620bb6680fe49d4fa3344930302e950b74ad005
SHA512ead68dd972cfb1eccc194572279ae3e4ac989546bfb9e8d511c6bc178fc12aaebd20b49860d2b70ac1f5d4236b0df1b484a979b926edbe23f281b8139ff1a9ac
-
Filesize
152B
MD5864aa9768ef47143c455b31fd314d660
SHA109d879e0e77698f28b435ed0e7d8e166e28fafa2
SHA2563118d55d1f04ecdd849971d8c49896b5c874bdbea63e5288547b9812c0640e10
SHA51275dce411fce8166c8905ed8da910adb1dd08ab1c9d7cd5431ef905531f2f0374caf73dedd5d238b457ece61273f6c81e632d23eb8409efbb6bf0d01442008488
-
Filesize
981B
MD5fee28b2a73c72fb96ccb2bbc94636ce3
SHA1541d624ceba13481b7071a44c49801b21545dd98
SHA256454e66721bf1f75f3db4f57b74f465fa34893ff7400017c8c6aec1a262c9ed73
SHA512182f9178a0f6ddcb6efaf08b2e21fe6f32c6f88c930ccce896daa20984683565388a099b96021e9c541f7fc19f715a144129fc7e5a7e79a6bc76298f6c80c04a
-
Filesize
6KB
MD53ee93e886262c1f0a7165988e76f9fc1
SHA1e00c5bac228fc06f8a9af1dbf64928555447e1da
SHA25641bbe287633e26a79aad040066a449f5d1fe007213ab74238db0ff463c16bcb9
SHA512999bba8299d82b48d5e4533ed306d9aee368a53c40b8e73b7e65bb1811c7079198786f3873335490e1aebd706c8e45c74101025da473e5fbf127542318a05dd0
-
Filesize
6KB
MD5f8bd2a93757810217f9dae9aa257968c
SHA14ff08b8c982d7b1ce8cd221895c44bcb520d0931
SHA256a3374b1a2c97e14482333e8cb5ee5edf5f7f2e8b84ed2258e28092c803630b0a
SHA512ff58d1943068969eddd370453d21268d6aa686ec8e88d77278c0a3eb8c8d02bd0d74e49da874234a83adf7ad332ec0f92ee1d45ffeac09311ecf498af9c9219c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5719a1c238e67716e38760fbca0db9961
SHA110ffe1902fab843eb92310fdfba8368445fc0a36
SHA256e746a8139f99ff24d107df33cfea0e75e008d29d54bcf97650ebbb632bf75140
SHA5126074a9979c01bb83bb3d9ce5346e68411d8f0e4be1930ab067d15293b4a59e0ca0132e73a61795220f7ee8ab3942dc131f662282683aa3cc5c98e6142f78c5c0