Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
81a31d0984990fd597cc156453cc96e3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
81a31d0984990fd597cc156453cc96e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
81a31d0984990fd597cc156453cc96e3_JaffaCakes118.html
-
Size
19KB
-
MD5
81a31d0984990fd597cc156453cc96e3
-
SHA1
7b5a9964fc1ed267664d56ad788222428d578202
-
SHA256
2adc394fa088a49229aec06ee2a2365738e72b57a99e1d6f302c4cee3037d674
-
SHA512
2360ec090b6bdbe1d657abc121ff748eb0c6705a241414c6ef049e398594be95e8a5d471de63caa33d56d1152941f93080963142836b7e651d53fa6fb8759d6c
-
SSDEEP
384:ziSKhgES4VBD8cyQ3RViIiK/vemLEXucfIk9xheHzVc9I0H:zifS4gcV3PiInemFOIk9eTqI0H
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 1428 msedge.exe 1428 msedge.exe 4644 identity_helper.exe 4644 identity_helper.exe 5616 msedge.exe 5616 msedge.exe 5616 msedge.exe 5616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1012 1428 msedge.exe 83 PID 1428 wrote to memory of 1012 1428 msedge.exe 83 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 932 1428 msedge.exe 84 PID 1428 wrote to memory of 2468 1428 msedge.exe 85 PID 1428 wrote to memory of 2468 1428 msedge.exe 85 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86 PID 1428 wrote to memory of 1408 1428 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81a31d0984990fd597cc156453cc96e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc19cc46f8,0x7ffc19cc4708,0x7ffc19cc47182⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,1502144440501347615,1726105949811175302,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD55c4c79845fc58d60d0bcf0eb604bbcba
SHA16a91e39311d1f95618ff6c37e98082a308b81f65
SHA2564edab739ff2b6dfce0a26cc3a4d8771a92e601de373b66ece519fae46883cd09
SHA512e376eea4e60b465dcc4e9d34959e5e32ea6e8ff0fdc9ed2c3f5b6e3ffb02e91a4edbf2af5822920d26cec49323d4bd46558eb0c0fa1ff9e1245200f331604ab6
-
Filesize
410B
MD5c909041783cceee3fd1dc492f160397b
SHA194ae5b91c78cb91e38d97d487db34cd42f39aaa1
SHA256b2a2fd3b164fd985cf8fd072497d9cc4f4afa99924fc41294c5423a2866a0e4b
SHA5124a97ca68247aca700adece44149e335d95479dacc354c41e61bb03832e6da604d10999c74260caafc9d7ee80b728b2c4ebc1bd16afdc76c60ee2e9373afdf824
-
Filesize
5KB
MD5f94fadffc01c110c5c8e804ff47cb72e
SHA10308539cc7f3bc28df537edcdb8a0d3a7c5612b8
SHA25643a963735520f0094ecd8e145d73dbe58044718d2c23a853e6ed2ee9026c9819
SHA5122533591c4098072c6e120dc67fad8b79c73ae899995572e19650d8c3613df97c970ecfe3fc933c3cb8205e525a4c7b7c1f95cb28383235fefbc5a1757d03ac63
-
Filesize
6KB
MD54021b3c9ee040229a18c394ea4ee1cdc
SHA133de707ae6da87ae84ad6073e970d945ada1eacf
SHA256e76c6348c03e4a7a475fb158deb0ded191ced4d5b6057698c9c5df3f0d57da35
SHA512a241b2c62ba6a7dd6ba89cff8bd600b5267c4a638aaa19d9b25e099800558295cc7621166a179c072ddb5d958fdde02976ef3a5f281c2f853c01324e0501596c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55eade517faa7130c43a6ef0e88e8927e
SHA1657da26fb683a7b6bae7c7f0f36476c99a3e9cc9
SHA2568f595a66996af67cc9e70e5c5a71ec7d30109c9a54145d172dc85b65eba03f93
SHA5127e0c230a634a859772d19027b3a31611fddf9e41d9cb39168a1ec6f915aef6a5db78e9ee7a70f256140ee989f9ab7d174da4969097f9e4ac78ab48f08055463e