Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
0d996b091b84588e7465ea45934ad45f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d996b091b84588e7465ea45934ad45f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d996b091b84588e7465ea45934ad45f_JaffaCakes118.html
-
Size
8KB
-
MD5
0d996b091b84588e7465ea45934ad45f
-
SHA1
9dc1715af9afc9058e42a20b69875c3070857146
-
SHA256
cbbf3a347470f7ac89fe0fa634ebadf148b085185cbd92c1434034e548000144
-
SHA512
94c1427574b4e1c9d84e52e59f5f8c8550635bc94791d9ff1bc31b524a48ae6565c450df09152a477b2cb28f9c71497125cb2ea6e4f186ea3b3a00dd54be146f
-
SSDEEP
192:A4PqaJlaMB8Yq1SLLCvTJgoTEp9ngbLF1J:A4S4lzXq1M2aoTEp9ngbL/J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 1936 msedge.exe 1936 msedge.exe 2312 identity_helper.exe 2312 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 216 1936 msedge.exe 86 PID 1936 wrote to memory of 216 1936 msedge.exe 86 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 3584 1936 msedge.exe 87 PID 1936 wrote to memory of 5028 1936 msedge.exe 88 PID 1936 wrote to memory of 5028 1936 msedge.exe 88 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89 PID 1936 wrote to memory of 2120 1936 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0d996b091b84588e7465ea45934ad45f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe424c46f8,0x7ffe424c4708,0x7ffe424c47182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5452760161392221368,3859946367710019524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD55c1a5a5d232842c652662de2bf328dde
SHA13c9222d5728476986cca48f7d29bc2e9772d219f
SHA256315b1f78baef83e0ea21f162a341cd1471f40395be0cb404e7329ec3f6843ff3
SHA51239ed98323868b30ac539f36effc6a1731d20751053185ca378052b2901bb9454e7914b5eed3826f2ddfa6841a7416328a0074fe5b6875fe262ecf071f7690e1d
-
Filesize
6KB
MD538da6d1ce2430f2df4a278212fa2a85d
SHA1050c8ebb55ee51545ee64c4531c964f54374ea30
SHA2565d1d41b20d614c79ff3f262177ddf63d29ddec7ebfe16e902800be2e28b423b7
SHA512f96354bbcd1309d4797ac3b296db765b1a0252d369cd32118abb1c5e36f3da62d37fa4637cc340d9d10428a3f14dc5b3b00d980c0aaa23c8a04b4aba7696b496
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD552271b5fb8cf619201969586ba81f54e
SHA1203a9dcf1147bdc00b0f729873d15206da3b37e6
SHA256117f79aa6d1ac8c7e60faae3212f0279371191f27fb0353ce79f83b6dc844179
SHA51272d74f10b7c45f6946592fceefe12e8021555eb0061cb1b5a58d9c4911c149468c6877eac3401b8aabd8b05eb4e4c873fa0d8b3ef1bea556d9393b7d8fba614e