Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
81ed2185d942230c81aca90e399de945_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81ed2185d942230c81aca90e399de945_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81ed2185d942230c81aca90e399de945_JaffaCakes118.html
-
Size
20KB
-
MD5
81ed2185d942230c81aca90e399de945
-
SHA1
b3ca7fe136063e5ffd149e379192c552a5bcec62
-
SHA256
82ff5d9ee26217b6d0c3f8fb3fde997bf4268596c8ce75ca5344d59cccc2bde4
-
SHA512
5fb4908f691601686dc658d1b25777046137c7cc813a92744007bdf6733dbc0b34eeaf30941bde93830bca3d87529b2298b074837ddca99f67743b73fdd43b03
-
SSDEEP
384:2QLPBQCSnWb+o8IyERagQ4pAS9qgtgcVfrXK132mW:2MPBQCSnWb+o8IhQqFbXrXK1GmW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4584 msedge.exe 4584 msedge.exe 344 identity_helper.exe 344 identity_helper.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4584 wrote to memory of 4596 4584 msedge.exe 83 PID 4584 wrote to memory of 4596 4584 msedge.exe 83 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 1836 4584 msedge.exe 84 PID 4584 wrote to memory of 4944 4584 msedge.exe 85 PID 4584 wrote to memory of 4944 4584 msedge.exe 85 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86 PID 4584 wrote to memory of 3780 4584 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81ed2185d942230c81aca90e399de945_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936f746f8,0x7ff936f74708,0x7ff936f747182⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2460 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,4789427181236289300,4988847895921606255,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD523b6e2531d39ba76e0604a4685249f2d
SHA15f396f68bd58b4141a3a0927d0a93d5ef2c8172f
SHA2564a486d7be440ddf2909be2c2b41e55f0666b02670bbf077ac435e3cddc55a15e
SHA512a1a7fef086526e65184f60b61d483848183ef7c98cf09f05ac9e5b11504696406120ab01da8ed7f35e3145aa5fc54307c9397770681e4d10feea64113e7a57cd
-
Filesize
152B
MD56ffd468ded3255ce35ba13e5d87c985a
SHA109f11746553fd82f0a0ddef4994dc3605f39ccec
SHA25633103b1e4da1933459575d2e0441b8693ba1ede4695a3d924e2d74e72becabd8
SHA5125d5530c57faa4711f51e4baef0d1f556937a5db1e2a54ee376c3556c01db0ddf628856f346057d3849baa5db35603b96a0a9894f3c65a80c947085eb640348ee
-
Filesize
6KB
MD591af7a8f56170b4eccdf85848a757d9f
SHA18856bab7442090f8e27ee300f5c0ad337d793052
SHA256d037bf7b7253809375c76496d09cc22ebf6013f6b54a8ab9cd93d91b2653bc8d
SHA5128935b49b262fca4fd4df06f3978f79afcd86f8a630ae960e63780bbc77bc5e9d1ebb2e00e09883b5d808f461cbb16c8c7964aae985a8172f9ad65e20365934d4
-
Filesize
6KB
MD538c28f08104dbcbd58558e2677d77296
SHA1a8bf438294653d8075b648f9e8d9b47601e2eaec
SHA256fb2d68a41499c5d98e629da376e0d870a50d1f8bbc3c2a1beb8f7a2f134e5782
SHA5120d1d5751b119ed64d5178a1fc0ecf10617b525fe6307c946260e04bfd8ffa5fae1e4adcf072e64bf4842cf2ff22693e6f8d97561687aec69d206ce3636aa8005
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50fcbb5e1c65b652ca9c3425453f4eec0
SHA154f139438b7bfb44ee4f643ff6dda32e00747c16
SHA25654b47c511cb3784524c7d2904a5114cc587577c0b408d9e0b852fa363f19e781
SHA512112427975cbc3da26617c3daa22858a2514de92136065836a5fa8a82f609a2d349b2590fcac4017825a04d7203295ef5af68e82e08d52999dcb0e70eca8f26ed