Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
81f07bb3380c3c1f697f2da4cada18fc_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81f07bb3380c3c1f697f2da4cada18fc_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81f07bb3380c3c1f697f2da4cada18fc_JaffaCakes118.html
-
Size
28KB
-
MD5
81f07bb3380c3c1f697f2da4cada18fc
-
SHA1
2017c9f11e897232b20fe85b1b13fc3ea358f482
-
SHA256
47d587a804bb087af6e5f7e5425689889cb97b08b2f5ce1302710336bf8f7f47
-
SHA512
84a5ecf95e6e1326341a63be2d6a5d1b33c9ffb5942ddecbcb298a18bbf3dcb4515c00f52226e922354bd198a1dfa17dfa33f55588f4f9eb0f6d14a37ffc5690
-
SSDEEP
384:SEQTziZX0B2LHsRQWp3lselGlfCnqGrAyuVTcUaSW1eIcj0N73XgUzRJKzOKoBAN:SNTzz5cSrAnaYzQU3Ge
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 1756 msedge.exe 1756 msedge.exe 3760 identity_helper.exe 3760 identity_helper.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 912 1756 msedge.exe 84 PID 1756 wrote to memory of 912 1756 msedge.exe 84 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3548 1756 msedge.exe 85 PID 1756 wrote to memory of 3644 1756 msedge.exe 86 PID 1756 wrote to memory of 3644 1756 msedge.exe 86 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87 PID 1756 wrote to memory of 5020 1756 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81f07bb3380c3c1f697f2da4cada18fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9780f46f8,0x7ff9780f4708,0x7ff9780f47182⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4447090357230215743,945148886882085572,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ea9ef805116c4ab90b5800c7cd94ab71
SHA1eb9c7b8922c8ef79eef1009ab7f530bb57fbbbea
SHA256bff3e3629de76b8b8dd001c3d8fb986e841c392dfe1982081751b92f5bd567b0
SHA5128c907d2616ce16cfe08ddeb632f93402e765c5d9430a46e90ab5ea32d4df0a854c6007b19f9b0168254ab7aadf720fed8c68d1a055704db09c1b36c201a9b3b9
-
Filesize
152B
MD5347755403306a2694773b0c232d3ab2c
SHA194d908aa90533fcaef3f1eb5aa93fee183d5f6ac
SHA256d43f2dd4ac5b6ba779100eb8b84bc92fc8700bedcd339a801c5260b1bb3ce3bf
SHA51298f1fb18bc34dfc224132dfa2a2e6a131b280b25fcb516fac3bb66da2a47c7a7061124881de6fa5f65602663dc0ea71357b171a3346bb1514176943438322253
-
Filesize
6KB
MD5167ec5310a6321b62bc3b8452040c0c2
SHA119d48fd391a063b7da34813bb42ac2e29bdf8c9f
SHA25614061f0557155e12095bd4494ef5947c0cd940c3b36f7dfe446ade5cf98a2400
SHA512b13b8c99b3ca2efa909b3a1a09c9aaf8957a7b6efd59cf9a19bad34837289432cd01d02aa349b3f9437a7f489af7bad5b2cea24c9f3dea091d23c35bfd800ad1
-
Filesize
6KB
MD5fdbb5dd2bc0f3e99d1b74609b2c733f2
SHA17649df6f261e2247655272dedc0c519f589a97b1
SHA2565fd956feeb25fef6769c7b8e54514a5580891dd8ab64c5b9985ec4f3000ae340
SHA51220b7770e02a9d2a916d53a12ff8dfc5766e4326c8426954dd69e376f1b89de7e83d5e83db49828bfd3144901df3e807ddc4ec3bccd4c0f259b2328cc5ebe4229
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c518a60d095b24086fc9ab0da1e47e73
SHA1158ed307a2e3fe7fb91605f8985affa500300579
SHA2565c51c67a0ebd2e32eac7fd09863bd59c2b82e26d26a47d10c07109ceb884d19c
SHA512625b7ccacd06eb098e2f524a74c4ca87228ef520ccedb19c4bb119f09f11a2316ce7956eb731a814def9623d8628299c42fe39919c0f86273c36fa71ec8d2ec2