Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
81c346e4cc6662664c9ae9da3fc9bb5f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81c346e4cc6662664c9ae9da3fc9bb5f_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c346e4cc6662664c9ae9da3fc9bb5f_JaffaCakes118.html
-
Size
6KB
-
MD5
81c346e4cc6662664c9ae9da3fc9bb5f
-
SHA1
e5eccf2b1d16594f797c3b1c27d9ad456ea88ae4
-
SHA256
1aa2b33c8b4c9daba3d3d6df7aadab48ea1ebb826e475c47dfafe3dc5a3d0ec7
-
SHA512
200baa9e34b17cc8fdc21e2394587a42438425cbb44676c1624405c3be9914292007789d5d4839ac3a87b09366daa043ecb0e025aed1a01d71bb86f678622d77
-
SSDEEP
96:uzVs+ux7eMLLY1k9o84d12ef7CSTUHh/6/NcEZ7ru7f:csz7eMAYS/O4Nb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 2096 msedge.exe 2096 msedge.exe 1076 identity_helper.exe 1076 identity_helper.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1316 2096 msedge.exe 83 PID 2096 wrote to memory of 1316 2096 msedge.exe 83 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 404 2096 msedge.exe 85 PID 2096 wrote to memory of 4672 2096 msedge.exe 86 PID 2096 wrote to memory of 4672 2096 msedge.exe 86 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87 PID 2096 wrote to memory of 2700 2096 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81c346e4cc6662664c9ae9da3fc9bb5f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb970046f8,0x7ffb97004708,0x7ffb970047182⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10460359385394036851,8329456511689793624,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f424846d13eef75a8065348e647b5c3a
SHA1be8a5c387e75f166f933402aca3f6e6f2129e4cf
SHA25640be99629f284d8f3b43c24811b93d372757306f37adbaa90e785ff2604f52cf
SHA512ffb2097c52a3baf18361348787dcb92cd10da54a25d85600184b0182d50f08420d91ac031141871868602ca788cd0eac66e302e8ecce220b2f707f8741e3d178
-
Filesize
152B
MD56c3a0da38ed31721bf66a6e7519f300a
SHA1db05166b0c96c42e4f89402f1eecb0ce00c5ff7a
SHA256e13bc70f7eee42221ce6f2ebe017538484dbc6ec1059450cae7c579dcb8e6199
SHA512c38a4e591360ae323d9be207ce2af8375ce3797bd16c3da2b8ed96c480d64fd1fd3062b1cd178f7be2f01477b68fa3404c021903c51abaecc90881f96bec76f6
-
Filesize
6KB
MD5449cb28fac222686330508f380d9a5d4
SHA1c18a0e1236372852d591b908b6c7d615043183f7
SHA25613431797f30dc6906995a0b7c129b872ad855c080d5e595fa9223d4e3155dc26
SHA512325453f3a152b7cf8c42ea5a4b44ef7e1ba154b56877f6478f3fcb9b71d99e4af47c02462c463f97a4b6c56597b6a50fa07733da80af013b9d3e915b83797c38
-
Filesize
6KB
MD5070dd56812e460eb7b700d1f49fbc789
SHA19a1f3a567cf7a476e19912f84c5ff44d5561f032
SHA25657bd17cfffbe6ad20cab87fb8b8b6611a055dfc9d088c7f47c514ebc3a0f60fa
SHA5122453ce7be10f24a1f79712c34f75570c996c5bbbe0ebcb2c45876a63d7e3002734b2bc220132da1463d9b042cbf023ac9e53ea7836abc46fc98f287d551e5995
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57c9cbd3af96b5d0e47c7dd7a5bcfb13e
SHA126f0c5f7b98965dc6c201023b3432141e0d256ce
SHA2566558a24b09b70f5d143deb566267944dc5ae59fdbbe61ca585731c71244152fe
SHA512918801a9000926b4fac713fe33be316928550b2151de20377964ba4af93d19c4ab0b2a4018f6de53985c0461dfa3ba3d67e4c81163d7300958af9601f151a5f9