Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
81c7d9b714029c41880ffd0f2769ff56_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81c7d9b714029c41880ffd0f2769ff56_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c7d9b714029c41880ffd0f2769ff56_JaffaCakes118.html
-
Size
91KB
-
MD5
81c7d9b714029c41880ffd0f2769ff56
-
SHA1
3877ff04fe5eacf0ef1b957d3026e837b12bd7ef
-
SHA256
1b83ccaabcd7158d6cf9cbca9d56f941f4a4996bff753a7518a0046ea6a7208e
-
SHA512
18cedf03e7bad45f655161809fb8889d939f05007b6eaaf095a01c55dfb675a67a3e213719bd5568e53b08915b3d52b33c454d140db595c072436eaa26ea57bf
-
SSDEEP
1536:gQZBCCOdG0IxCNzov0X0nBC3pYxZqZQwDEYnqFdwUqIuhZ8Gjc2BJwWaAA8eU90a:gk2c0IxwPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 4612 msedge.exe 4612 msedge.exe 2652 identity_helper.exe 2652 identity_helper.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2260 4612 msedge.exe 83 PID 4612 wrote to memory of 2260 4612 msedge.exe 83 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3660 4612 msedge.exe 84 PID 4612 wrote to memory of 3388 4612 msedge.exe 85 PID 4612 wrote to memory of 3388 4612 msedge.exe 85 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86 PID 4612 wrote to memory of 4208 4612 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81c7d9b714029c41880ffd0f2769ff56_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd165546f8,0x7ffd16554708,0x7ffd165547182⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,13171137713326618943,17098313997399012567,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58edf5aee848362b3fa4c7102382947c3
SHA10ca71672592fef3c37dbf92a155d747c927b433f
SHA25616594552785f10884854bf38d179c9c3d26d023a089180bfe5a3ceb03c395e6d
SHA512a8863cfcea01c05938edd34690db467f0d429f0598528f23392ca7e7233a9b2fe2eaf7b886ac965e22e8c63ee79af84654e5b2f7e94033e5f54622f7b9584893
-
Filesize
152B
MD578d53c4ecb4f237a195804abc28ebb1e
SHA15b036abe11431d0c164cc5427aa7eaaa2d8d1580
SHA256b1ead24150c5c17d1e8cdfaa64b4395cb1b0872c6f4bb25eb8e024ba0e39c847
SHA51290c1e12b736dc1a644262a44141f4bd7eb5fe935249978d1ff083e39017652ab847107add5b5fbeec6318db181cd22a728938fba7c384c8023ed8e3c03e61496
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD56f80cb63971a74c5017070aacb2e77a1
SHA1d191c43b2fb3bfc56d28958b997e81a3f683bfeb
SHA2567f0206c4fd3a2c8568711654314605668103425d30a3850e79f8a176d42a2de1
SHA5125764d611de18558e3e291b26c83f3d08f22bc5fa88152ce4c02cf7f8572008548da28a67b58a27e259b6954caca375b0cf7c965424b11f09c6e2e5e11cad1e6f
-
Filesize
1KB
MD574b013da418c99c05d5cc14bd57e4069
SHA1f9f6750470652a196b2d7171851ee2b592e5edea
SHA256e08941c103c22be023b09d8ba5fb020002ebb010c33882e9137439cd646bcaf2
SHA5124522273f27f997d097b3909f22f8a93f323870fbf2d4ca94f524f45b8f8188ed0d9845e9a6db91b5e2541b4f9f5f8ae1ed84d4ad56576847c2c106c29f3bbdee
-
Filesize
6KB
MD59016c2a0fa4d5a4d1573e23a175a672f
SHA1c1e71a33819b22cfd2c2bc7676469969f26d7918
SHA256c15fc9f88177f0ddc0ce318fc82a8da28ae8549374c0fa3c0fc4b0d89b68a900
SHA5124c00104dba7aa48500057926934b8c1cc9a21b7f35177c36a28046bb9f1228f9bc9be273d4472d8a2f67bf567a3410625917bda827bf74de6bc0866152b45f84
-
Filesize
6KB
MD51e14705ebf8bad158464051b3968c918
SHA108bff609377322ded6ed16e83fca9556083f7543
SHA256c952d52d5984159a921abbd11ed62d60e5a452f5c4c3019456cb8b460f4fd233
SHA51220a5eea6275b5a5d1f83710f744e15568cd43f2e89d31e29ed6c7aa7026ad94cb03417729b3c9ec5c77b890215a80007e2498b76c9cc7d259cb1282b9fbaf63e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55957a6618703fb29a5c9f001cc16804d
SHA196e26b00dc7e22e401f65fcad12a9b3ac0814e7d
SHA25650ddde322a0f09839ff8ba3e65e969bd062d8cdddbe5913e3d703820ba592009
SHA5120371b1cdcab836ffa6a69b89423183db8a1604bbe98c0238d70adaa524945db4c138be0131454c7fc2d20d37944ebd54d4ab636feae741f5ae39c028686154b3