Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
0c3caee8e9afacff2a22593458df9f06_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c3caee8e9afacff2a22593458df9f06_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c3caee8e9afacff2a22593458df9f06_JaffaCakes118.html
-
Size
58KB
-
MD5
0c3caee8e9afacff2a22593458df9f06
-
SHA1
1412eabf4c22b33bfb9114bcf152925912ef777b
-
SHA256
087a70b5d18cd6c871ef3a19b09f4bf6242b395a8b265a445b83f9ab4fdb034f
-
SHA512
94d781d71accaf1f746648873c9bfb3e7086b5421f11558b2a0f71fb34522e38c316387b314d4ede760dd67228b6a0afe53c67c822241fa5b8c278214dc8260f
-
SSDEEP
1536:mPzz9IwAvRAce0ghNxgefN3MU39DMglNJfXwJ0:EQvRAc/geefR9Dt+J0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 2964 msedge.exe 2964 msedge.exe 2428 identity_helper.exe 2428 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 4788 2964 msedge.exe 83 PID 2964 wrote to memory of 4788 2964 msedge.exe 83 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 4948 2964 msedge.exe 84 PID 2964 wrote to memory of 3408 2964 msedge.exe 85 PID 2964 wrote to memory of 3408 2964 msedge.exe 85 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86 PID 2964 wrote to memory of 2740 2964 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0c3caee8e9afacff2a22593458df9f06_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe080f46f8,0x7ffe080f4708,0x7ffe080f47182⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12113227845803724596,9428241415847503598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:12⤵PID:3312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
381B
MD5ef9c09f34254fd321f0bebbb6a430fd1
SHA10d287df69a87e6d417c316119686e3f888cde48f
SHA25648d50ccb5c1a7cb6a6b1ba050aa1b6055d9ddd6bd288685315b9c447acd05bcc
SHA51264e4c1113aaa32b962cee194fef36408c190e5f1d48f24ab236f77344d91dee24eba0d9c247480e473f7cf2517dec00c3788618eab3fbe19202aa269efc54d23
-
Filesize
6KB
MD5ce8dca640dcfad80b5ae997117699371
SHA1fb0ced17afe1dfc3490fb7d99dc70cefa72411a8
SHA256ea7a3632ce2146b63b6c183936b31e3e0ceddd800990daf5db641bbbdb0bb29c
SHA51240249efb536e5080157b6b71bd9a851b54f2cf1338a8590e542bbb719de455816b8bb7e8608d1dd4d374bd4937b16b5fb4d5a7a415b14ab930037fef084fc5eb
-
Filesize
6KB
MD5b615a9d1ef3fed61a33874180d874d64
SHA1a815c04f8e6d56703e55ec9d0506c441a0ef3927
SHA256847551ee495659f4ddfed97df20e54f1c4116acfe3b6510c9f21c0e7d9e8a336
SHA512308cd3b8815a079a04f5bb734ecd5f99c7028062211369697be34d1108c48790383e0cf796bff79a0fe634241dc54ce4da98e000994c39dc50a87ba046c99554
-
Filesize
6KB
MD54b634c863aed26b3395050ee42539c2c
SHA140184a4a432b4403de5d3b858a0fab82a4aa8387
SHA2563c346ce0299c6a1382bf1ff9953406c79851e6ee2a52fcbabb30b99fda17ce47
SHA51297dc3bcc9f7eac015e4ebf50bff820c29edc749e5a192ca4888eb372df4f73a0bfb034b31c46941ae7735021d338f49554d043ba5b1c0c79a4e87c050f834f01
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5650aab25e775e5573fe5f6e05c775903
SHA1d7e1f92b700d41b7906d60e0d9433420dbb83ee8
SHA2562af5022efd4c35aeb38729a4f1717b2416e2ee764593c7f6c3b8911164684340
SHA512c3bf0e2fce5dc8714cd0cf1896e15825ae2d8115bca093ee685140601860dd2373dfce1315b203f7d9da2f0d9ca20b3d2a308c8414fa125216fce21650a39cd5
-
Filesize
12KB
MD5383465aadb6bd8a4b092deebf53edf1c
SHA14518962590935389f62337ac97820d9877e03fc2
SHA256c95de5f829b2c4a5d577b3eaa640c6e9791244cc24fa0a59919bc1f7884f237c
SHA512ba83046d91b755264feda76e5a59b01e8593728b5da56a226618b72c61b5adbca3340c65bf0a6999633a9b4dcd1bca4c1e816dc6aca80a4114ac79a3ebc41430