Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
81cb0d6c16f81f1cc9608e56a9e982c9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81cb0d6c16f81f1cc9608e56a9e982c9_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81cb0d6c16f81f1cc9608e56a9e982c9_JaffaCakes118.html
-
Size
53KB
-
MD5
81cb0d6c16f81f1cc9608e56a9e982c9
-
SHA1
2d06f6aba4772b84160ee8aca8556f25c2f3b514
-
SHA256
18d5988d5b33e73e92bcb1c36c12580973d76c7b7371168f46a7743c943da6fe
-
SHA512
de96a5100a76c9699db55aa986d587c05dec18e99d7e11f163d04be59d00a35e88c748b6f16de9d01238d2e7e5a74234d2a7d521434d07f8f1b278d5b520329e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlYk63Nj+q5VyvR0w2AzTICbbboh/t9M/dNwIUEDmDM:CkgUiIakTqGivi+PyUTrunlYk63Nj+qk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 3408 msedge.exe 3408 msedge.exe 2344 identity_helper.exe 2344 identity_helper.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3408 wrote to memory of 1008 3408 msedge.exe 83 PID 3408 wrote to memory of 1008 3408 msedge.exe 83 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 4180 3408 msedge.exe 85 PID 3408 wrote to memory of 2728 3408 msedge.exe 86 PID 3408 wrote to memory of 2728 3408 msedge.exe 86 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87 PID 3408 wrote to memory of 2488 3408 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81cb0d6c16f81f1cc9608e56a9e982c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd165546f8,0x7ffd16554708,0x7ffd165547182⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18405832652360255655,13363487916944333979,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58edf5aee848362b3fa4c7102382947c3
SHA10ca71672592fef3c37dbf92a155d747c927b433f
SHA25616594552785f10884854bf38d179c9c3d26d023a089180bfe5a3ceb03c395e6d
SHA512a8863cfcea01c05938edd34690db467f0d429f0598528f23392ca7e7233a9b2fe2eaf7b886ac965e22e8c63ee79af84654e5b2f7e94033e5f54622f7b9584893
-
Filesize
152B
MD578d53c4ecb4f237a195804abc28ebb1e
SHA15b036abe11431d0c164cc5427aa7eaaa2d8d1580
SHA256b1ead24150c5c17d1e8cdfaa64b4395cb1b0872c6f4bb25eb8e024ba0e39c847
SHA51290c1e12b736dc1a644262a44141f4bd7eb5fe935249978d1ff083e39017652ab847107add5b5fbeec6318db181cd22a728938fba7c384c8023ed8e3c03e61496
-
Filesize
403B
MD5a798c46534131f9c9a131f3434c1b19b
SHA1b989921439d486221b68c1e9817056fc6e1a36ae
SHA25696eea5f24c1bf84516cf64f407e3409971b7311994d8f01d7417d3b989f12208
SHA512cbd109c251f625c4278be45c88847b40805a90a76c6b836ea2fe9d93c59a6487fcedb3b616fa7d9ffdd973b93f2a764ec901b0d2b04cd73b1e47b367011cfbd1
-
Filesize
6KB
MD5412e0dcbde2e8b8ec83f3ef453e56650
SHA1395581ba2f2aaad767d5bc535b0005bac44f0ae1
SHA256d86f3d7168cc1b74dac3907a35fdef5804222f5e450bc33414bde284fd7fa8e4
SHA51248aae07fdb13fce777b7a7b8384196165954a3e7d7942543041322e7afed20233078062913ab5bf5c620d8a6f7b4ef79b28f03138312ee3c78e98362047d3688
-
Filesize
6KB
MD558cf3c053cb65151d50b783b889304c5
SHA1c0cc7290e93307f35625d945f1a99a60f6d5bfe2
SHA2560a946eae525cc6b87045d6397f3ad9ea0c674b1292ea202993928c6ef232c576
SHA512f1864c1ddf5d05d04ac3c0b088944d779e31db657ea0ccc8da553d00a1bad0cfa4ac590d1e0abd28789870fbb21e750b0cf2e2c288321c931aa26f008fef3e0d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD502cb1dcaad1507aa5157155eb4c2290e
SHA1b6cdb7e3dcbf6ff0aac5704feab25e84f25f94a4
SHA25681f38ac76c0e9b93ed53cccf6d74eb6c7ce782eb13204f4fe01f0c9cab25ce80
SHA512c630fab474cbe31549e2eeb5e753a7bf47c7d38e05d3df312e093ffc81d744387076e9a9ee2aafdb0d933ee6cacdaaf81ce3692482108c12bb8a5ed7112a4a30