Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
81c8e8a2ddf302d9efcb94da705691ce_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
81c8e8a2ddf302d9efcb94da705691ce_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c8e8a2ddf302d9efcb94da705691ce_JaffaCakes118.html
-
Size
135KB
-
MD5
81c8e8a2ddf302d9efcb94da705691ce
-
SHA1
d206cfcd0d549e6baa128504fb526dbc1fdade89
-
SHA256
62e98aa1d4ab4813eaa6bc952c9969fded71341b653880825b9e229d8c4b49cf
-
SHA512
486e1ce95130410beaf787b1e4215b6c9dc06c7f174ce7362a889ac74effebf0065afc718a338dbba9f149ef0c3f00fb2c02238c691c394a3092546404735709
-
SSDEEP
1536:7fUdcM3W6c87dvaeqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:7cqfEdcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 672 msedge.exe 672 msedge.exe 2724 msedge.exe 2724 msedge.exe 3848 identity_helper.exe 3848 identity_helper.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 100 2724 msedge.exe 83 PID 2724 wrote to memory of 100 2724 msedge.exe 83 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 3620 2724 msedge.exe 84 PID 2724 wrote to memory of 672 2724 msedge.exe 85 PID 2724 wrote to memory of 672 2724 msedge.exe 85 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86 PID 2724 wrote to memory of 5008 2724 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81c8e8a2ddf302d9efcb94da705691ce_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff831c446f8,0x7ff831c44708,0x7ff831c447182⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,25866792288243529,3668406210760266083,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2660 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f424846d13eef75a8065348e647b5c3a
SHA1be8a5c387e75f166f933402aca3f6e6f2129e4cf
SHA25640be99629f284d8f3b43c24811b93d372757306f37adbaa90e785ff2604f52cf
SHA512ffb2097c52a3baf18361348787dcb92cd10da54a25d85600184b0182d50f08420d91ac031141871868602ca788cd0eac66e302e8ecce220b2f707f8741e3d178
-
Filesize
152B
MD56c3a0da38ed31721bf66a6e7519f300a
SHA1db05166b0c96c42e4f89402f1eecb0ce00c5ff7a
SHA256e13bc70f7eee42221ce6f2ebe017538484dbc6ec1059450cae7c579dcb8e6199
SHA512c38a4e591360ae323d9be207ce2af8375ce3797bd16c3da2b8ed96c480d64fd1fd3062b1cd178f7be2f01477b68fa3404c021903c51abaecc90881f96bec76f6
-
Filesize
6KB
MD5ff659b0a57b3bfd0f510ae0f7d7e7061
SHA14658413ef97f45a218a6016f6c6da6a681de0dcd
SHA25625bb321c3a5789be0b6ead60661fa34ea67436c68e0cf8820ab8197b032c5391
SHA5127d14121f70fc8bc561edd4f03686ee105d9ce9415dc8736983a04eb6c12182bf7a11c03d792b1e1b548738d45e5701639d9072b8e2b191665a5f15a258bd32a6
-
Filesize
6KB
MD50cbfaacbe41abd6e38a694e275442e99
SHA12f993f780355abe4f827598a2960d996e85f4050
SHA256584fb5590e314bd166400cc450e4b5b5e6504ddeb2eb307a0bf7a302799171c0
SHA5125167ec4608b4255f34deda8af197e5e99f459ab2c33108d2b75a5e2349eb1151df72afc481d63a320e46f26367fc5482b51ec99415b0bbc4528288d9cdb74a4b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD57bef2790020b778c18054b8e849e2fe3
SHA14f02fe8f2b92ee534ac814fdb008a0e7b0031074
SHA2565d797182969ab037238ff3394e53eb8dcf7d92ca4253a48841464eebc0141e2e
SHA51248f380cdf88374ad164fa611524ccbac4de2f0c95bb32d25d162a64904c3112333c0f3530837118956848300033ced8523c74fdeb8567f406f8abcc99c29c752