Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
81105aecd03b3b5c8aaff9f955b6401e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
81105aecd03b3b5c8aaff9f955b6401e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
81105aecd03b3b5c8aaff9f955b6401e_JaffaCakes118.html
-
Size
213KB
-
MD5
81105aecd03b3b5c8aaff9f955b6401e
-
SHA1
527fdd5fc8da0315eb7c851495944777e9b95e12
-
SHA256
96628a52b8adc1bbf491d5a3db9a1dc3af2edc09ae6aa9b2b3dcc02043e75330
-
SHA512
840f1a62dedf011edcc01f306ce8a82fa319c25b6d2567b9da33be85580bf988a899c0e7833ae0e5036726727b4e0c9f18fcb755d3e0272c18906800086373cd
-
SSDEEP
3072:SvaxmcBYoZxyfkMY+BES09JXAnyrZalI+YQ:Svy50sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 4068 msedge.exe 4068 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1280 4068 msedge.exe 82 PID 4068 wrote to memory of 1280 4068 msedge.exe 82 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 4284 4068 msedge.exe 83 PID 4068 wrote to memory of 1636 4068 msedge.exe 84 PID 4068 wrote to memory of 1636 4068 msedge.exe 84 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85 PID 4068 wrote to memory of 1136 4068 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81105aecd03b3b5c8aaff9f955b6401e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc763c46f8,0x7ffc763c4708,0x7ffc763c47182⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,16991416787284292115,8202487569825364337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,16991416787284292115,8202487569825364337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,16991416787284292115,8202487569825364337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,16991416787284292115,8202487569825364337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,16991416787284292115,8202487569825364337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,16991416787284292115,8202487569825364337,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD5ae9d89132f8567ccd0c3b0dc7253aede
SHA19888d9b9ae6e0a4ce0e650e782c74367c20f3285
SHA25686ba6f518fca3bee95b1110ce76267c4d71c175f7e2dfbe6a0ba15731f9fdf2f
SHA5126b0e6ded80ab2957836668a9f8d5e2f86a20dc4a976ea7c6544f639898e74e59d08720271a482223c1d8eeaa5e6b178588e067dd04976d34347833786b9cea1e
-
Filesize
5KB
MD58778da6608f6c6eca06a6c00ac5a43b8
SHA11c075b52e809d436de6a7c2ebfdd3ae74d6c55ae
SHA256a5b6b34e4067fd118d24c03e8d0a7b1176d5f532f5d9028be73e3e3946b585e1
SHA51289dd3c62cc510a87ae237faa2dcdc7bd7b63cc1df9dd0b922ccbbdbcc016e7b9c453099bb46fa133200fc2c3dc02d3184fe855c3a1b2d08317353df8aadaabc2
-
Filesize
11KB
MD56d4827b1638509cd7d62e0fbc66164f3
SHA1db560faa04e846ef0f8fa2feb9095f8109014e08
SHA256d8a56d47d56abd7118c2f3cfe9dc8479d5dacd73e825366c253dfd5680029deb
SHA51228f9884f23230145a58958a056a4912d02032c1c508ac311171fb9251b828a5b3e2d67a8ac108a3cfbe50e8818fd50708375f419a1bb46db65318317c63da2ed