Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
0abf0eb462da23871dae5ce3efc90bec_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0abf0eb462da23871dae5ce3efc90bec_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0abf0eb462da23871dae5ce3efc90bec_JaffaCakes118.html
-
Size
24KB
-
MD5
0abf0eb462da23871dae5ce3efc90bec
-
SHA1
6af2cedab8d555c212a46d0c977120ba2a2f7149
-
SHA256
7a0c43ab20987ad669ed2343e02e6a13251bb2aeab50df5c40a9c58f261c14e4
-
SHA512
2da19088084782532c45db57b6916e7e069e96737e3817abf68a6a6d401b1e30b8c58543e26a9e908498176482f2f937f98fd59f60e16945b693b427186bea14
-
SSDEEP
384:UZhMii7uqYRY5BaOmnRCaicP/ZW63ebON9+RinOkNSWbjSGTWHAQuS821B:CnIccBmpP/ObON9+RinOkNF+HbuS821B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 1308 msedge.exe 1308 msedge.exe 4424 identity_helper.exe 4424 identity_helper.exe 1108 msedge.exe 1108 msedge.exe 1108 msedge.exe 1108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1368 1308 msedge.exe 85 PID 1308 wrote to memory of 1368 1308 msedge.exe 85 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 1688 1308 msedge.exe 86 PID 1308 wrote to memory of 4892 1308 msedge.exe 87 PID 1308 wrote to memory of 4892 1308 msedge.exe 87 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88 PID 1308 wrote to memory of 4508 1308 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0abf0eb462da23871dae5ce3efc90bec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff035946f8,0x7fff03594708,0x7fff035947182⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2700 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11377297273601935373,1040356432880009840,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
247B
MD590f9a00ddb20985a03660724c6148250
SHA16219170833ea3f7c405a5aed6c133460e84c6615
SHA25655063ea9d64f0f087c4d4f9b2ecae01b224ce26f6d8bd7b8dabb7a9785697d27
SHA512838f711f4efaacaae9f3dc83094e271dc916827d97c6166f22873559f27fa8e452b455ece1bb28c3dfcda5484ff63c16679c7d15fcc21bec311c5f5160dd905d
-
Filesize
6KB
MD57a973fba192202ad0115ad9b5912aa68
SHA12a99bd25f25e36e69739e5e06520c4655ed9e793
SHA2562c104b161a6f76ba925904c927f14815f23ce33b7d5fd44e6a02955d6167f641
SHA5125a63b120c93d037ccd2bde208d635015c6e187748403a3297c07d907368784165711acaab1f0f0c334ba6e9880e2f865cb57a90b496508681701bd282c945661
-
Filesize
6KB
MD5f65d509d1b30c25391c216394fcca6f7
SHA103585679b44898bd26cc267177e47ec60d1a8154
SHA256a2bfca51d9424ce4d0ddd65810f7e5713a3ce51b955e447bda385da9baad1ff7
SHA512de1af6e6861f25bf13f6de5b009022294c4ee726ac882bb105a060b93ebf97c74056af0e235b0a90057305379c246b01114acc90bfaae6f6a32fe3d855ab6f50
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c20ec6770d61297f71c5d37cfadc2826
SHA172a759652e89469010826b0f5690d637842be8bd
SHA256e9b745f7412ece9f3d95eb89e3cc93ab5c5cafc916d9d88b1bc55dd87e776918
SHA512693947f20a9a6a89821866c8140d5aa5c0b30daadc09ca62b44701babe56826c5430d4d7911f232603c32847d10ab6312f0068f18351d6bc02b672edfb10cedb