Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 19:27
Static task
static1
Behavioral task
behavioral1
Sample
0a71ec02c6a5f3886ae9907070be21c9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0a71ec02c6a5f3886ae9907070be21c9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0a71ec02c6a5f3886ae9907070be21c9_JaffaCakes118.html
-
Size
139KB
-
MD5
0a71ec02c6a5f3886ae9907070be21c9
-
SHA1
008269946bc94410a465c64db763120e734603a7
-
SHA256
c542c02bd3d15b69362b5f48390335acb4884a8ba746d27090ee31d78dc09a1d
-
SHA512
b4c893d0917f75ed871f428953453e4c72d8b0587c3d2da50fda9d246965d57b9bc5e0cfe221099f031ac0c0a37f88a4e33ee71c688dd89ffcc22d33fa9d84e7
-
SSDEEP
1536:SqN7l3HSluvnyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SqDBnyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1112 msedge.exe 1112 msedge.exe 2432 msedge.exe 2432 msedge.exe 1900 identity_helper.exe 1900 identity_helper.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2404 2432 msedge.exe 83 PID 2432 wrote to memory of 2404 2432 msedge.exe 83 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 3540 2432 msedge.exe 84 PID 2432 wrote to memory of 1112 2432 msedge.exe 85 PID 2432 wrote to memory of 1112 2432 msedge.exe 85 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86 PID 2432 wrote to memory of 2692 2432 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0a71ec02c6a5f3886ae9907070be21c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff685446f8,0x7fff68544708,0x7fff685447182⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,17261564538369242594,3845409759487647738,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3532 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD589f61595a20eef7b6e18d28efbbbbc40
SHA1b162a0404d52538e7c28a82fa1492539c7252ed1
SHA2563ae9b59b61806ad11bc6f8ab67cb8c65d2cf38b03d4a5c02febb7c13511c7f47
SHA5129861c4ce0b9e3293977b754ab16e01d2aa68ed4d5ef73cca44db4abe751f5920f7ed56ab674a5c5f5232c4f1c3bc2be8d255fffc0af56b9ba4b6669f4675ba53
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c4a613c4-2aaa-4bf2-867d-7cb5c9a9a84b.tmp
Filesize6KB
MD5b2c8c2370040214e476774e85ccefe5d
SHA1b08b08aecff31c653799802f261012b863401f0f
SHA2568d348a3464fa0bc534897c3cddb85d0d8ae87d37e244550aaabda9be4ff81834
SHA51209d3c8d3a598ea3543afe610a5cd1e202e4cbc26e7bbb0ae7c06c1c9462aa59ea98bc530257d42958c3dc022ff7fe63faae8efb418e0818513296079d2a83dcf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5a9e7e7f6ada47fa1aa504af30a3c2b3b
SHA1a8b53ca9e2c2a45fa98a6b215432452c56da83f4
SHA25642570275c38afd35455751d327c56943bcd9fc421ae242495c9c05a3fe81f78b
SHA51218e5b2a710ed1d8fcadf86b04745f7d5dda31a2ce1d17a2ba2983c636b4de8288c3a4e9c92ddb2db69ca24c732803a3e6f1b2c35756fb22374d85267566e5d78