Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
0d58f6823f184521fe32d16330651e9e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d58f6823f184521fe32d16330651e9e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d58f6823f184521fe32d16330651e9e_JaffaCakes118.html
-
Size
48KB
-
MD5
0d58f6823f184521fe32d16330651e9e
-
SHA1
ce165d8e8be40f1eae88c1ad2450567435a6b901
-
SHA256
dba0bff163ba7c0ecf7b8f6a0eb14b1f6a55bffb018ae8d0fd6b5547c66f3311
-
SHA512
440be091e53dfb5e82fb9093998a55ac40597abc3c46d545738a4e816aefc688493c35b2a216e2867bb11b898dbe01e9121c0654d0e352db17c304d9b1d41944
-
SSDEEP
1536:9mxuX+bsWPW23Ws+WMKDe33uDZrIplZaz11LnCQQIetwV1aoNCSzsl:9mxuX+bsWPW23Ws+WMKDe33uDZcp/4NM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 2556 msedge.exe 2556 msedge.exe 3404 identity_helper.exe 3404 identity_helper.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 1124 2556 msedge.exe 83 PID 2556 wrote to memory of 1124 2556 msedge.exe 83 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 3456 2556 msedge.exe 84 PID 2556 wrote to memory of 1408 2556 msedge.exe 85 PID 2556 wrote to memory of 1408 2556 msedge.exe 85 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86 PID 2556 wrote to memory of 1916 2556 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0d58f6823f184521fe32d16330651e9e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8917d46f8,0x7ff8917d4708,0x7ff8917d47182⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2828 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2608 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6689552257601837136,7265773214186291591,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
267B
MD53954f04acc7ec2f83afc127ec62371b9
SHA1eedaa30b11ab7ef737a71667c62d898f9829e1ab
SHA2564029d64acc0fbf4e4f214010d79d6197d6dce7d0f0efda4ce6efa3bb8772dcdf
SHA512f39adf4b121a9b46ca7a27095760e2f2d21368a09854a3062eec93153c0273a856f7e93fe2b16fd21c330441a9ddd7d596e6ebe37413363e42c82e2615084289
-
Filesize
5KB
MD5d89a5080a0bbc90861e7dc507c3f31fa
SHA168ded2253c7fd74bed3f7a11d025f136b254e6a6
SHA256335b003c0f5dfd34255265a868dfa14a37b2dbd4e7dd2a15975944fbc6021a86
SHA512cb2730cefa9aeec7268a0d1e04e52795f1d4cdb04a45f51542d876d68fced2acdf3e4a133224f936dc5b32d6a7a035ab1be9b471996772bd373b1dd095bd65d2
-
Filesize
6KB
MD52620f933e090c6a6a00a247557d298b9
SHA19ab5ad9830e74b4cd882da315266cc54a0126363
SHA256c5ed98ca0a6f4f867b953999da3bfb7cb37d70dddd560d4cb4eb22653a4a67db
SHA512a67524cfe11eede451edbb01673b91dc51ac032c89c370bde5391b12f8fc043a13dc44563c0c37ff659d06c7a532532c75bb3ab867e847cdc083b27c6b785c8c
-
Filesize
6KB
MD5ab91c494c47404ef7633632c44b5eb1f
SHA1b6b9e2927854f5276af69dc08de7891a48bebee0
SHA2562ede2f5887046d388c16fda9bad8a91300eb36935077d62921bfd90aa6c61f21
SHA5126c2d0ff9e2ebc37a4f1973d3f5d2fdf6ad2f8f3dc4043635a4a010e7bd45fd296737a8f7cf9357d39b79162d401b6ad87c42c002a5ddbae5a43d0799b59f5b20
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55491169bf0f7e75186fe4114411c0fe5
SHA1a2ff2917216fd78c7bb1ba3ed63188f6296adeda
SHA2562c82fc09b02bd5326cbbfb0bceddab3820faf3434120e5e146107942f39c9c61
SHA512936c9f163a2ad4f365d930e9933f33feb92af7f86f783e671e2c7c270a50d2b218c7dda99368f96cbb0fd9aefe3d52e2eb5ba4f01db58e8496322a03447ae2fd