Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0c5c2f753ea26d0c4c6cd194ca06e6aa_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0c5c2f753ea26d0c4c6cd194ca06e6aa_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c5c2f753ea26d0c4c6cd194ca06e6aa_JaffaCakes118.html
-
Size
201KB
-
MD5
0c5c2f753ea26d0c4c6cd194ca06e6aa
-
SHA1
7391d6c1f7495b6aea336e4a2c94770da2311f3d
-
SHA256
84c78c963cf9c428724476926079ed52f8856d77b035447373377dc4c258d84e
-
SHA512
0722e6857624abfa4ff1683a9789bbc7fc2f983815382cdf0f79de38a700cc9f5d3b4cd5983af0ce5505ee2c21db5863102adf1cc4ec261fa5fd908923913ff6
-
SSDEEP
1536:ka6qugjKTXZ/31eHRbJ4NFgNbXXUOK8tcphah3yjgr61pKGvM:d6YbXJpH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 3612 msedge.exe 3612 msedge.exe 4944 identity_helper.exe 4944 identity_helper.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 3028 3612 msedge.exe 86 PID 3612 wrote to memory of 3028 3612 msedge.exe 86 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 4400 3612 msedge.exe 87 PID 3612 wrote to memory of 5100 3612 msedge.exe 88 PID 3612 wrote to memory of 5100 3612 msedge.exe 88 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89 PID 3612 wrote to memory of 4864 3612 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0c5c2f753ea26d0c4c6cd194ca06e6aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd13c246f8,0x7ffd13c24708,0x7ffd13c247182⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,10536944206629746001,339530236305676014,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\61a14723-e86e-4433-9fab-73f401390eb2.tmp
Filesize6KB
MD5eb832cc656a7c8ddc075fcf1b2a4ebef
SHA1dccec4d71d00ad883c6f0b89debb5797ccf3ce9e
SHA2565c0b889aa5877efeea97a0cedc47ea63e4503be1cb938c70ef7a4f739cc0f3eb
SHA512df491f3a3a3d93cbe0eb1fd0d29741d6145ea64a6cbe51cad127db3d91b1a5f655a0958562f5be4b99fce0e96041aa54f53789d1be0491d161d1e9c49b70b608
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
6KB
MD5745a6521239ccd752a6508a4fd3acfbd
SHA1d7d0de504783a5d7adee1179adfa6fce566b87de
SHA2560d5075795743bbf23e39d0989aecfba162deb9257c80c4473fd19db2419c389d
SHA512a94dfa31f265db537157294f21159d04f7431cf3151c079e1b56e8b84c1dbb46287bea2708ad276480696497c1d5784b7a2623bb98ed26b3747e5b9873d7a3b8
-
Filesize
6KB
MD5ff5bdbc62e5eb84acdb9064c4e40cab7
SHA17f351fd5c466e1752abd48102ea3f4a379fa8644
SHA256fa9ff60687512f683a2118691b771ffce3b92aeb1705b97ca23ca7babb9dc7c7
SHA512ba276ebd96e37c4aeac2b0bf22e8e2f91d4013325d8f723a64a57d6b988131e9fe46c7c2cde850f776690e3d9b16f00915f46f8aa9d1cf901fa67cc2930a5534
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD588c9650bcf09156c1dc1e90417a1ed0e
SHA1e77a1ce9c413c2916b3e1e4c4ddd3583ffde8776
SHA256e3a664e253756a97417cc652d9482b9185424c6c0be14ad7502af795a286168c
SHA512eed55cad0159afd4b623c022934b50eb22cb9a78416f3e9e04a94e2a3813ab780d2558f06507a76d09a2e82bc8d0ea34d429898c0d52e7ba672b6bd7340e47fb