Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
81138acea3f14d62cfad120daf1d4482_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
81138acea3f14d62cfad120daf1d4482_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
81138acea3f14d62cfad120daf1d4482_JaffaCakes118.html
-
Size
477KB
-
MD5
81138acea3f14d62cfad120daf1d4482
-
SHA1
234f62b92c4a61f2057177a26853f596b40a3594
-
SHA256
733bdeb9f11a188af44837b1b6166a0e9fad85b282052f3e9917ced9681ccb4f
-
SHA512
b8473c97e7e8f92db74078853b4269437d6472cf834cd91183bf2762b2e650f17b374326dac15141c8b7f4e068710baaf6c12046f38131e4f321d15c687f1d7f
-
SSDEEP
6144:S91sMYod+X3oI+Y6tvu6xAmzM86P5sZpMFzBtug4r1GcFBU/b:Oh5d+X3poCPuzmrugwG2qz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1724 msedge.exe 1724 msedge.exe 5064 msedge.exe 5064 msedge.exe 1676 identity_helper.exe 1676 identity_helper.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5064 wrote to memory of 2372 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 2372 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 4404 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 1724 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 1724 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe PID 5064 wrote to memory of 116 5064 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81138acea3f14d62cfad120daf1d4482_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa087846f8,0x7ffa08784708,0x7ffa087847182⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1284 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3032 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8792543658290372375,1445629067849624049,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD59682a7a2e06ff7f8a094981f5b5c7b14
SHA11648b9fe2eabc20ee79563dd51a5c424bed4f01e
SHA25605fbd90207520182ef53c16eaa484e1b411089f2fa9596060d2a1acd866be9e5
SHA512d9403c637fa28bffdde67d5e616c4b967abe2a2369acf4ff6b8ad1a2d732b7408afa8aa72ab83770861769b2fd7ece1f0f60d9f8173f624694ee45a526ad2e7a
-
Filesize
5KB
MD54dd111df1c08954c9d0d978cb81fb92e
SHA1260a6404aa3048dd6b6314684d73e549f9b30aba
SHA256e2763f2d92bf33adb3d4c8d54b478703cb03c615306ccde54db4b921bcce60f7
SHA512473cdbb97dfb634b9a389582a5b0a4c53a1c83965a36e3df7242acbd971944bb633e9444d37693599115ec3b5dc2591f292cccd98cf798cc3ca5436f5f9f3e2d
-
Filesize
6KB
MD5488695c17889b622de3ab19eef60c5f9
SHA1a7bc5f5df091d8c1743f3bacf95f9d620f84954f
SHA25656c700c5be3e6fd4c6529c42c6f52dfd57ea4d5edd1d6597d332697fe5842dce
SHA5120f54167a4514ab56b1248f3a6efd5a682b9acefe21f798f14212c6f71588618dec45de190b7284310e064fbd9c7998d2f398edf55f82656f4db676e369a6d2c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5314ffed43b8524b3c18db418680e06b0
SHA17b28be8593dd0e56f72d5276d8428cbdb81ff256
SHA256aa87e61b01b4d5a792b594a6363ef05036e46bd10121d798e1e74d9a38fbe4b0
SHA512c3c2c1eff9087f8072d48714370649b97b1d94f7aefb54f5bf1fa945b020cda776d58389ec906518cbeda3e2da3ab5593674996e75bd5c95d2d9ab4c3bfd0643
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e