Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
81da2fded65d84936601e4387e4f5740_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81da2fded65d84936601e4387e4f5740_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81da2fded65d84936601e4387e4f5740_JaffaCakes118.html
-
Size
1KB
-
MD5
81da2fded65d84936601e4387e4f5740
-
SHA1
0414f08fc4bb79f175cac90781c1244ad41c6d64
-
SHA256
7eaba05c74eb10c65d9edb2947ebeef3391042d939934d6757739975a8b3dc90
-
SHA512
7f3886cf7bc513ca83ca0016aee8fc8b014bd46a27ee09026e12dd4dab1590376f04c189b961cdb54c9a6d9c59923b9c88db6f40880228194a5d7d7c50188d8a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 4468 msedge.exe 4468 msedge.exe 1108 identity_helper.exe 1108 identity_helper.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4836 4468 msedge.exe 83 PID 4468 wrote to memory of 4836 4468 msedge.exe 83 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2384 4468 msedge.exe 84 PID 4468 wrote to memory of 2752 4468 msedge.exe 85 PID 4468 wrote to memory of 2752 4468 msedge.exe 85 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86 PID 4468 wrote to memory of 3016 4468 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81da2fded65d84936601e4387e4f5740_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98bee46f8,0x7ff98bee4708,0x7ff98bee47182⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,12610601480710069748,2198833636236907284,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f424846d13eef75a8065348e647b5c3a
SHA1be8a5c387e75f166f933402aca3f6e6f2129e4cf
SHA25640be99629f284d8f3b43c24811b93d372757306f37adbaa90e785ff2604f52cf
SHA512ffb2097c52a3baf18361348787dcb92cd10da54a25d85600184b0182d50f08420d91ac031141871868602ca788cd0eac66e302e8ecce220b2f707f8741e3d178
-
Filesize
152B
MD56c3a0da38ed31721bf66a6e7519f300a
SHA1db05166b0c96c42e4f89402f1eecb0ce00c5ff7a
SHA256e13bc70f7eee42221ce6f2ebe017538484dbc6ec1059450cae7c579dcb8e6199
SHA512c38a4e591360ae323d9be207ce2af8375ce3797bd16c3da2b8ed96c480d64fd1fd3062b1cd178f7be2f01477b68fa3404c021903c51abaecc90881f96bec76f6
-
Filesize
6KB
MD5ca5dc913c7ffdbe5e8d44fb02716bc17
SHA16fd67ad5591ff9891ecff85c4379e1568f3c522d
SHA256cb3eb0943aa45bf03ac424841e8e2fe9c26520fc7f4960e9c9141b5852e9c0ac
SHA51233accd4ac22372b5a9e41ec2bb664223a1f3a9303ae105ae42d63771f40019a78d520766ade5638dc622d7912e2351e686a7411dc810d7ed204e9258a75ac5a9
-
Filesize
6KB
MD59e444a3c048346fd822d510fc6b1d7dd
SHA1233a1b6f02cc4f30f8dea01eabd2432cdfa220fb
SHA256fe5d113167b537df44ab3ae2ff139e3107c803f646fe449094019214552d152e
SHA5122491ad7d7de9a55c9d8a1e25073be2d1247211877eec5fb972f1c1dd71387eb3df5e490c3bdaabc734c837d0e8c21e2bbaed39f9db1214228ed874b48b9a0465
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d6257e584662ee027a98d13eba82be14
SHA1b8b8a6bc1b31ebd0d96800d2d0ae42e86d4f245a
SHA256404d586249ad58e06b5d1945677a4e18a4fcf4e1412663d1a4a3970d9ff5c882
SHA512b972a82a8a1113078c7f00bb88cc717cbae7b72bf4f3b2c3452562fa4097e23300de86c66d71a1435d7a1264a54e70bc16015e4cb25fcc73beab5abc22deff75