Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 17:18
Static task
static1
Behavioral task
behavioral1
Sample
0a306ee452aeb5d5c67372bb6121d40e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0a306ee452aeb5d5c67372bb6121d40e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0a306ee452aeb5d5c67372bb6121d40e_JaffaCakes118.html
-
Size
60KB
-
MD5
0a306ee452aeb5d5c67372bb6121d40e
-
SHA1
62cf90567ecc6a7ffb5736afdd71527c895008e0
-
SHA256
a553cd7bd3102ab7ba4ec10a1e0e1ea295aa602438d891798f91ce9b3e9ad7f3
-
SHA512
b9bea5cdf1168eb5b782e830c4c0f25c459c051eb7fec7b2723fb010eb293c072337b9dcf3dcf80a7038a8a1dc54f4a95a0da04a40335b9df1d5b06ac8bf5910
-
SSDEEP
1536:t0U3FF/7AdFUSWhY4IqeEfuqYc2cew00QGWMP8DUVsjIliAG2+WPw5RQb7hLE7Sg:V2MP8DcsyiAG2EReIeD9HVeTYD9SyKFp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4376 msedge.exe 4376 msedge.exe 8 identity_helper.exe 8 identity_helper.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4948 4376 msedge.exe 83 PID 4376 wrote to memory of 4948 4376 msedge.exe 83 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4616 4376 msedge.exe 84 PID 4376 wrote to memory of 4432 4376 msedge.exe 85 PID 4376 wrote to memory of 4432 4376 msedge.exe 85 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86 PID 4376 wrote to memory of 1812 4376 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0a306ee452aeb5d5c67372bb6121d40e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb2cd46f8,0x7ffdb2cd4708,0x7ffdb2cd47182⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2312 /prefetch:82⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13639194373544570538,7374606418688857517,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4392 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD569a97f8f31785b43379f81dc071a877f
SHA114d46bfd479f0d330b17e606cbbccf945336ca62
SHA2567db9d8a10d7f32953ce2e6e6e0caf42a74d0ae38d8b5f079ca3fc6b4120fe6d2
SHA512d256bcc314f7beb5bd2f38b9a6ef10830504750aa121cfe7cba6222dbd36b893cd9b6417afd950c488ff55836f1090d268658eb4936220a8ca9c84e4a9cd3f04
-
Filesize
6KB
MD5c275c79f26e6cf472b381c5eb8c2ba42
SHA1ea02803fb72d574f10218efc581bae6292b9cbb8
SHA256dd3fce6259e28b2a3bdba0afbdade7f85b866b924a012781b631a76fb4e0f41d
SHA5124e0ea87cabc9e389de49ac402faebc3e1ab99ff7bf83353d7830f6b002625a19d7285650e8caee9e30bc69a809be8acf5df8c5419d285953843cafc5eefb2d99
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD54230a3a467935eeec507e4d9787ed4e1
SHA11803a8e0c0a9631bf3b9f0790504c279c9fef41a
SHA2560798c2615fc0e5253542e1025d1dca9582ab653a1d2779a1826c9f9967a470bd
SHA512e94066eb4cc4190f4ffab73cb1a5aee8706e33dd4a9fb642e6402c77e3c904eb24399c157dcaf1d48e7389b4bdd2cdc6cb3f456096c0dad877c647081096b199