Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
0a0e97224c6d17e47d5e0e8b918c09a3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0a0e97224c6d17e47d5e0e8b918c09a3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0a0e97224c6d17e47d5e0e8b918c09a3_JaffaCakes118.html
-
Size
34KB
-
MD5
0a0e97224c6d17e47d5e0e8b918c09a3
-
SHA1
1332bc59ce1b07804272772808f624ac5eb8e7de
-
SHA256
d0297b736a317cab86c446b74d2b83aa554a46ed36d5ae4111dc10c3686ef91e
-
SHA512
c236a0c1396b79285c3e8cf6d3e0ba5233c3e9370d0f61634dbaa1870c9ba5e7bbcd1603afc580911f1510d35cc86f667b33dd060097731aa129e412d0934ddf
-
SSDEEP
192:uwDHb5npxcnQjxn5Q/YnQieTNn6nQOkEnt4KnQTbnFnQOgicwqYfcwqY7cwqYQLW:ZRQ/7GL95LFt85zka2HRm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 972 msedge.exe 972 msedge.exe 4984 identity_helper.exe 4984 identity_helper.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 972 wrote to memory of 4324 972 msedge.exe 81 PID 972 wrote to memory of 4324 972 msedge.exe 81 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 3356 972 msedge.exe 82 PID 972 wrote to memory of 1636 972 msedge.exe 83 PID 972 wrote to memory of 1636 972 msedge.exe 83 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84 PID 972 wrote to memory of 1664 972 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0a0e97224c6d17e47d5e0e8b918c09a3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba247182⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2799572568883141617,16489854342963322998,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD5ce52c4baacedf91177dc19833645a752
SHA15e7b59554e6ef352f1a2021277f6c7d2d1b11eb3
SHA256b3138b2208f3560ac66ac9b8dbbc70e728376f5ff1333bb8842ee896dc4e9400
SHA512d241d4225f0a763ae287452f977623adfca06586584a22696927693e3efa38b2c1a6546a39c446ad5a1c6ac0c7b7a4eedac56cd32864701a6f818e4e17e69598
-
Filesize
6KB
MD5a7bcd42f63d7f4a74aa7277a45c18f1b
SHA1dd3eae3dec734977da65e1917dd060d051fb212e
SHA25680887fbd4d409f7e40fbb0c72c9e06f78dfa0743b74133d03b9f5f38cc63a8eb
SHA512231814eb00e992da5cdf0af398b31595748d2817d27039af501dcb43876d2136df96d339c6238a16e3b216b526e91ca363cd0f88925c37f94763d98490ceeebd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD58763568cd1b436ced3ee342e39f2422d
SHA19bed87a51c09899d86ea6b708a1220ae14c137dc
SHA2569ae800bd5d9f23b2fcd9d6aa17b41d6469edd78f7addb14b4c56647296cfd625
SHA5121045daae548b2189c2a76d68ee021638d12b6fc9127a01e75abe82826808181de8c297be6439961420759fb5883d87535c11002b329c732595d2c11737f463ff