Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:35
Static task
static1
Behavioral task
behavioral1
Sample
81ce7f0dfdc919dbaecc9c098ee226b8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81ce7f0dfdc919dbaecc9c098ee226b8_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81ce7f0dfdc919dbaecc9c098ee226b8_JaffaCakes118.html
-
Size
47KB
-
MD5
81ce7f0dfdc919dbaecc9c098ee226b8
-
SHA1
381cfcd373d9aa9861a411c054b3273f5b5cdcb6
-
SHA256
42ca9357715ad9f49cb19b3d9c70ed0f5286693da00641df720a2f5f3bdd907c
-
SHA512
4fbd0e9ca060ed91ae6c2de93887e5c11af2dc217f841c158f13146e665dcb7f7b827d2f65aedb75964d68bf02952efb30b4f2c9956e1e2feccafc7f23ca5ee7
-
SSDEEP
384:tvlIcqtl43NGTHhF8bgPtW9+gTG+ex3PcjYttuozkxJo7UcHnzJzUNFvobR1tARF:PA5yoIcHFgNBobRwZchg4ExLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 3444 msedge.exe 3444 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4808 3444 msedge.exe 83 PID 3444 wrote to memory of 4808 3444 msedge.exe 83 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 4392 3444 msedge.exe 85 PID 3444 wrote to memory of 5036 3444 msedge.exe 86 PID 3444 wrote to memory of 5036 3444 msedge.exe 86 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87 PID 3444 wrote to memory of 684 3444 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81ce7f0dfdc919dbaecc9c098ee226b8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff968d146f8,0x7ff968d14708,0x7ff968d147182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,17871098918448091447,4204705032450794286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,17871098918448091447,4204705032450794286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,17871098918448091447,4204705032450794286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17871098918448091447,4204705032450794286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17871098918448091447,4204705032450794286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17871098918448091447,4204705032450794286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,17871098918448091447,4204705032450794286,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD554a5c07b53c4009779045b54c5fa2f4c
SHA1efa045dbe55278511fcf72160b6dc1ff61ac85a0
SHA256ff9aa521bb8c638f0703a5405919a7c195d42998bedc8e2000e67c97c9dbc39f
SHA5120276c6f10bb7f7c3da16d7226b4c7a2ab96744f106d3fea448faf6b52c05880fe65780683df75cca621e3b6fff0bd04defb395035a6c4024bb359c17e32be493
-
Filesize
152B
MD5d3901cd618f65d66fb0643258e3ef906
SHA1c9b42868c9119173ff2b1f871eeef5fa487c04f6
SHA2561f74c3d5f4d41c4d5358e63ad09f8cede236eb66957f9888f42abf98b238c086
SHA51289c122ea72ae3f26c94e34040e0f0a856506c8490ba36fce371a731b3f0588407c6356cca2ebea37ac829a67c2b398e298a64d5a72712172f69071264ca58e98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5bc697e7983296b230d506c7fcf9ef5cd
SHA1db08b990906aa4bdb9cbeeaf783e6d6c43f59f38
SHA256be17aa78b0dda40e13c4163fef88ec3dd3bc067e14424aceae371e5e2c649307
SHA512cf6e410ed206ec8c62b2018cb4f973233c1f55fa36654fb37979c53df161a56d5d84836bd9f690f4c43e3c80712e71ff492a1cd8de2fd5b9ebd30bf67895fcdd
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5b62e06efb26ae51ec67d1c5bd11e8c15
SHA1762de59db0198dfb3bb28c56aa3dd9f10d5ff6a6
SHA25695e645e94c99c60785af8347e848af78b37775876c815a0aa86466824e6163b1
SHA512c78f36a020b0aacec72620820036a35740d7513f0e2ca4263287554a69188bb9725c6ecc83cb312f8601c931138733f1cdd2d3e8fe50fc7dda4fe0ee33313d0b
-
Filesize
6KB
MD576a0311dfa2ea918fc8db7e8da002bbb
SHA127d94e82b1a9c9c94386d195de4f543fad6ab146
SHA2561ac6bf555c1a2678b2e808a456305567c202bf91139d4ee0fb1172c4cda74fb5
SHA5125b1322529da9b12a5578d989b737082e37705f5748d94984acaf553352451bc4df5d15230ad00f781ac9641e0a8a9f0a1f24df50d0c810b109e96ab2b71c5714
-
Filesize
10KB
MD5a6eee033609c15711aec3db369b71313
SHA1467a344725d64f83161c5b4adf6b668f8898ef75
SHA256474e96728208cc8b51c88544bb1f5d7ee83d5f8c3bccc5036d4c6932c63b4c9d
SHA512e383fa90c388816ca8abb9fc2de71da1b50318483b4a2b55500c75273c4f1fcf1b80efd4e4774b497f9940df89601c216e6a730fe540ee5ffdddffdd897b1784