Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
81bfd49ee8d246d64de2cc7bb0d35d41_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81bfd49ee8d246d64de2cc7bb0d35d41_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81bfd49ee8d246d64de2cc7bb0d35d41_JaffaCakes118.html
-
Size
48KB
-
MD5
81bfd49ee8d246d64de2cc7bb0d35d41
-
SHA1
1eb797a41e4139667e20d6cafe6a55f102e47c96
-
SHA256
5b53cbc7bf603da241c5b0aa0d7319df4c6059e7021cf34ed77a65103d304dfd
-
SHA512
b46eef5cee7d6f8c0a459f88faaaf5555e2608a1e29b38544fddacdffe8d337de4954d5d3fc749fdbcead405d496e836fa89ad6af6f6fc3f2205806a2302a9aa
-
SSDEEP
384:ShB0RdBIyKJNWCPk5CoNrTlLyzTPiOFboAnwwkFKSGPFxPl8Pb3PfkfJ0cXj6a4Q:ShBmI9GyiORiLd439
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 3308 msedge.exe 3308 msedge.exe 464 identity_helper.exe 464 identity_helper.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 552 3308 msedge.exe 83 PID 3308 wrote to memory of 552 3308 msedge.exe 83 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 2052 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 85 PID 3308 wrote to memory of 1688 3308 msedge.exe 85 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86 PID 3308 wrote to memory of 4052 3308 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81bfd49ee8d246d64de2cc7bb0d35d41_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc5f046f8,0x7ffbc5f04708,0x7ffbc5f047182⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5979648656230818354,5973528428839281427,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ea9ef805116c4ab90b5800c7cd94ab71
SHA1eb9c7b8922c8ef79eef1009ab7f530bb57fbbbea
SHA256bff3e3629de76b8b8dd001c3d8fb986e841c392dfe1982081751b92f5bd567b0
SHA5128c907d2616ce16cfe08ddeb632f93402e765c5d9430a46e90ab5ea32d4df0a854c6007b19f9b0168254ab7aadf720fed8c68d1a055704db09c1b36c201a9b3b9
-
Filesize
152B
MD5347755403306a2694773b0c232d3ab2c
SHA194d908aa90533fcaef3f1eb5aa93fee183d5f6ac
SHA256d43f2dd4ac5b6ba779100eb8b84bc92fc8700bedcd339a801c5260b1bb3ce3bf
SHA51298f1fb18bc34dfc224132dfa2a2e6a131b280b25fcb516fac3bb66da2a47c7a7061124881de6fa5f65602663dc0ea71357b171a3346bb1514176943438322253
-
Filesize
473B
MD5603199ea563ff64aacf9bd156ee1b8fb
SHA1b5086d803cd8a6cfec9bbdfe7e410ecd30e41231
SHA2565cd03f892dd6ccf1ca3493332c893196571fad5ccd755311455221c6406cab57
SHA51243f47f90c51e74911d5f46630bf09a8cbb51d42ac97d223d78a4ea44a27e5cabe58a4269c24d9fe1c1df33b80911d5159ab0ab25885f45b5d599ac12cb61181c
-
Filesize
6KB
MD584c8087ecb67ba355ee648af85659ca3
SHA1a627e85a76ad39a9a680fd26e7ec827b925bba3e
SHA256dfedb1670d176e551c60c8747c5b2937ee882508225a1fd444a353d0217ce754
SHA512ae60c7d79c1e8b6033eed133397d9a07620af859a627909e479fd7713c1f4e498c2f3aa6bf1a60b997b6cd2dad0ee17525a73f2b896faa4b9222be3fb8cb1f3c
-
Filesize
6KB
MD58239a94024e17322b9eba2dcc24bfc58
SHA18dcfc03dfa2c6d126edf93d285d3735eb348a9da
SHA256f5535db8c452ee29d8f19ddabb112e2af223ef3a0209bdd63188a0461c6ce124
SHA5120072f289013d8ba78c140ea8088705bdcc58d09116e6ecfbc910196239c5d84ed7776f7057652a1057ecc4e8f2e47663c7567b3e068ad1806d33653152365a8a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD509768faf9756b3de031bf4da9290fa0a
SHA11e9cd3ea5fea5726e18db73a65b591a25281c811
SHA25651ebe782f3d8297e729766e9d618bde37912509a3848295854e5a99746b473b8
SHA512f0828ee0d9a588d71b81d2fa9b4c127016330a3935915ad7f74f0e876e1d2674c6aac8d117427832fa80f4511dac91aea101c70abca0f9bee9703c9e52d94fc4