Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
0d9149146f60cc74530acb7585b15f59_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0d9149146f60cc74530acb7585b15f59_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d9149146f60cc74530acb7585b15f59_JaffaCakes118.html
-
Size
20KB
-
MD5
0d9149146f60cc74530acb7585b15f59
-
SHA1
87bf370f9a1f6a1f432f8157b66f36105d8197bd
-
SHA256
8be05f7de80ab7ce56dd03c97a3535bcf7867a8fbf4bce1c30e41288f3feb518
-
SHA512
bac485a032854c638051a711af8c8f86d93c2e0adb59277b2300ae67749ee03cafa39e82749c0f36653630e9bfc3240e892d8b9b6dbcd3440350994fe5fe05df
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIM4WzUnjBhyk82qDB8:SIMd0I5nO9HHsvynxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 1744 msedge.exe 1744 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1436 1744 msedge.exe 84 PID 1744 wrote to memory of 1436 1744 msedge.exe 84 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 1472 1744 msedge.exe 85 PID 1744 wrote to memory of 3456 1744 msedge.exe 86 PID 1744 wrote to memory of 3456 1744 msedge.exe 86 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87 PID 1744 wrote to memory of 1740 1744 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0d9149146f60cc74530acb7585b15f59_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7fffe0af46f8,0x7fffe0af4708,0x7fffe0af47182⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,15073381423522933528,16342587975224614728,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,15073381423522933528,16342587975224614728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,15073381423522933528,16342587975224614728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,15073381423522933528,16342587975224614728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,15073381423522933528,16342587975224614728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,15073381423522933528,16342587975224614728,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
5KB
MD557b815769fe15a675b8766c62c742291
SHA137984305677677c2cc1cece6abf6026cdda1443c
SHA2564981b1845d4cfedf89cff1b00ad1b0d50a827ee445792564439618a4f04af194
SHA512627d265f014ee62bdbe2c30bfd631d34fb09588b6aaaa367c7bfece3e16011c3ab37a96271c43f88076e3999bff32c4f36613f0bad05fed324370673ba5d9964
-
Filesize
6KB
MD5af0998a7fa84ca78836b2c96098df12e
SHA16727b74ef6643084d244b65deed12cef94b05654
SHA256bac5cc1c6c91b891e8d829dad00e805cd11df4cbc6a43d5bcab1ca8f7d4663cc
SHA512430e33ad42fdc8619faec1f212116b7d2442f84aa7a80f2edc50f471273965fb60b08b3c91509267c9ce87b7868d050e9fc17702f8cddf416403ef415183671d
-
Filesize
6KB
MD57f21ec66fb7a203f789d88de937ebad5
SHA100ad3c4c0ff6cd9fc5c3df30f47a199e3ed473e2
SHA256d726ceb048d79ace21b1adc271aaa9578676a4a21342c6fb8f7d006545ace81a
SHA5129137c5280f332bee3b48a7bedb249b64a5f9f8d1bb7ca069e49de63db9b7922976dab18e0199aa7c39c3d08938e55676e5328e567f351aef281786e359cee58e
-
Filesize
11KB
MD562035443c519652394bcdd9a0418c6da
SHA14566f69273e1fbe148ad7740586ca714b890dd9b
SHA2566e0f3c7f040e87ba6305ac9482999a5c5d37e8d7cef3433295017b5eeec15ffe
SHA5126cb87010cc58760d139196691a0e2b6d0ce3137b60b811ec58fd02b9c7d4c99e948e8baf13d5ebe193574b6bb389353c1d4df9ed42aa275645ad23d0a9f0973b