Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 03:04
Static task
static1
Behavioral task
behavioral1
Sample
0d50a6b487ae408bbffedb7dc59ad9bf_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0d50a6b487ae408bbffedb7dc59ad9bf_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d50a6b487ae408bbffedb7dc59ad9bf_JaffaCakes118.html
-
Size
36KB
-
MD5
0d50a6b487ae408bbffedb7dc59ad9bf
-
SHA1
9ae9ec3aad64e72d466a7a568502715480275413
-
SHA256
f2f7648134b4ea4a06f64e53d44109db438a486739f9150e7f01a5e1b0934c3c
-
SHA512
ffd48e2147e3414a89ee07ee5709f6d97ba5a74dc46ecba70bf849b6e29c5a991a224518efcc8616a4393f60c0fc0ab724ff2d4321517e8bd85137724bd8b1eb
-
SSDEEP
768:CyicE9hnEZsMPEVz+AUJAUjAUAAUpAU/AUfAUOAUMAUWAUrFx1o:Cyeuclj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3180 msedge.exe 3180 msedge.exe 2272 identity_helper.exe 2272 identity_helper.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3180 wrote to memory of 1320 3180 msedge.exe 84 PID 3180 wrote to memory of 1320 3180 msedge.exe 84 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 1324 3180 msedge.exe 85 PID 3180 wrote to memory of 3800 3180 msedge.exe 86 PID 3180 wrote to memory of 3800 3180 msedge.exe 86 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87 PID 3180 wrote to memory of 1656 3180 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0d50a6b487ae408bbffedb7dc59ad9bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8ab46f8,0x7ff8f8ab4708,0x7ff8f8ab47182⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,2807497144875844290,1041574268835091370,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
6KB
MD55e49fec65a4c973b142a640255814e37
SHA1a4604aabc413b44ee3417c01f19ebf1f52c58fd1
SHA2562d059ec5aa2e87829e93985cfc81e2f291315c5cd873c0943977927842032b86
SHA512bff53310ddddf0a259e448bec4e25804cb509b4c25abfd7d187b0e011db97b9d2482913dea875332fd7e81d4cec3c1e2d00752963d8f5b41169b1490c9468693
-
Filesize
5KB
MD54c8a0e70baf6465fe6118eed1f34c1d3
SHA1d469a9ae35abb1db420379f49df5373f769118b7
SHA2567813f586ad57134e187453f4ebbe5e650ef938427b8bac7bc03851366f83b571
SHA5127ca0b689e4e72122feafff982bb2dc9913023f232b483149ecd3c0d50d984d03d30489598c18208e0262aed932dcb520b69ae1d2f3f02b77189a5bf1fc0a5c30
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f2c043b37787c9f0c459ca5227675c74
SHA1d9db5fee841d2e2b3f88c9cffa13f534a90bb856
SHA256ce4ae306827eb45eedd21b0ee001fb6928244d0658cb66fd8cc1177dfea94bbd
SHA51210bb61e13527839b7f03f2508f9f1ab07b568dff61ac53f930981bf8002c8e5e45356a3a0218d1ba9c594ed261c27de0e96eb26a3a311d928856089d3ac8efcd