Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
0cc50ad72a9f9c087f7f843f7f202c97_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0cc50ad72a9f9c087f7f843f7f202c97_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0cc50ad72a9f9c087f7f843f7f202c97_JaffaCakes118.html
-
Size
69KB
-
MD5
0cc50ad72a9f9c087f7f843f7f202c97
-
SHA1
f219e36aa619c7ca7877e3aae1bde76b1ceb1182
-
SHA256
6160d68b6f2026a0a4f51f94053def9d460fc9cd0c68a5767eaefcd1e53b9970
-
SHA512
293e675729fb38a8bec45fd587215a4ee77154f5684be5f4c0953d20af716390fe6438e868d28cfac2160d3918cf7376238d1c3b6241b066bd54fca21544ee21
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sT6RXHtfh1oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:J3xTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2756 msedge.exe 2756 msedge.exe 4728 msedge.exe 4728 msedge.exe 4844 identity_helper.exe 4844 identity_helper.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 2208 4728 msedge.exe 84 PID 4728 wrote to memory of 2208 4728 msedge.exe 84 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 920 4728 msedge.exe 85 PID 4728 wrote to memory of 2756 4728 msedge.exe 86 PID 4728 wrote to memory of 2756 4728 msedge.exe 86 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87 PID 4728 wrote to memory of 664 4728 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0cc50ad72a9f9c087f7f843f7f202c97_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd919f46f8,0x7ffd919f4708,0x7ffd919f47182⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2744 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2744 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,7951246061718856487,6061550084031757443,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD5d3deab97ad8813b65189dd99403dab43
SHA197c258ef0084f5c412aca87ef6ccf85fbfdcb04f
SHA256a72421b071d1845a62225f11fd62fdecde58aca6c0e6151d457b2cfb817c34f6
SHA512b9716c870dd7755b0114e25f2e73da30645117d4eb6043a7499c8e5b9722bc608be93d304ce2f1e6df8915eeddbfde2695ad4d5d64173bb3c080aad24a8a5763
-
Filesize
6KB
MD559e822e50c9351a05169ce2d9e1486b0
SHA110e9b3c6d04131597ad329c43b2aad6dee9679cc
SHA2564e02bc9b2b38ccafd0d4917e014a778fb8da08c887218f104921418d532729fc
SHA5122d839f67ed071d524dca0b61f48aa00f7a8153fcba4dc36d079d34c6035dc7011e5494cb65c153e3710350f4619a939ff592df3a864c5fb3af1e96942e019750
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a678965653ce7ed17f6bb613dfddeb4f
SHA11e2479ce58ef0c8d034484e2cff83eb45e8e49a1
SHA256266119f72b91a6af0e23693c74fd8ca5bd888659329f243ad8a85b23ce758dc6
SHA512aca5c5268437d91c100858e61a244d22d0425748a7139bf8ec31f3c5ac4642d02f8436c15cc40af5ce455386947171a01c41949f67566e7abb687d5ed477c3e4