Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
0e9c9e5b082151bcaac7436099042f17_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e9c9e5b082151bcaac7436099042f17_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0e9c9e5b082151bcaac7436099042f17_JaffaCakes118.html
-
Size
76KB
-
MD5
0e9c9e5b082151bcaac7436099042f17
-
SHA1
29360b39cb96d28cadbf4fd9788b41ee9d440a6d
-
SHA256
002cc95334cc09d8175c48648dcfde0d3aa76b7e5470ff426726c7429e5ac434
-
SHA512
318cd9c2abbbb1c62ef6b472df49cb129028a47c9b73937575370624f5d2b27a7674fed56ebf70914ff9acd47b41ac7b9b9303fa6dc162c4a45dbd452abd4368
-
SSDEEP
768:ew8psSOdF90HQx6c9HArKCMUux5hexEHVs7hmRsVWMVZ2OyUZQDyYuBx9M2j444d:PSOdF90HQx6c9gBUx5hGWg4ZW4aW3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 4384 msedge.exe 4384 msedge.exe 4420 identity_helper.exe 4420 identity_helper.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3400 4384 msedge.exe 82 PID 4384 wrote to memory of 3400 4384 msedge.exe 82 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1772 4384 msedge.exe 83 PID 4384 wrote to memory of 1832 4384 msedge.exe 84 PID 4384 wrote to memory of 1832 4384 msedge.exe 84 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85 PID 4384 wrote to memory of 2516 4384 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0e9c9e5b082151bcaac7436099042f17_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc030346f8,0x7ffc03034708,0x7ffc030347182⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2844536076768872227,9846376046388116653,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
180B
MD522f9ae4330f11e46ae650f5f5cab0af0
SHA14c70f68e4b8317f4347d5bf992b8be57bc6304c3
SHA25686ed00df57e7a4687e707598d028bad604ade12b1d13636d98fff439c2f03e9b
SHA512ea72af42ba3abb08e180ce3376ad068e0515593fc752eaeff8f7fec52713659683f9d63af4712130270d627826d5dcd7b67eefa02c623dc984c8ce77f6d4b6ad
-
Filesize
6KB
MD5d76b66a3cd313e83dfd75a612be8f4d4
SHA161c4b0ef329af00ee7c2ad28109814b0a98ca925
SHA25608c3771ed0f1916028e47a85ac3278f0812c94310379af55354db1b23f1c7a8d
SHA5127918e3e428aa1491ed103d205ee48a8f3161a2fbcb8c42b04203d3fc12ee2fba15f63c829d1fe5df97c775d6ac21ca8c66aeb234484d563c84a6eb362460ab8a
-
Filesize
6KB
MD574ec1e1595125705bfcae05218d67271
SHA13b2f76291d796f84659b2b0c38620f2e9e1ab620
SHA25655e4c2f93af57e23a6aef3977c2a6aa621977e2d481594588a4bd9e6f3b71000
SHA512ffafb5b76d7cab42c46546059e1ab3aa0f662e57ce2853c10ecd69f77207ea9ac2a73dc41dd91e480ed4e3619c2bc7461f9c99565499fbbb0945ed0940bf4639
-
Filesize
6KB
MD52ccf25d1ddbe8d71e4b8a1d075266636
SHA18a8211b013a1613fd34d46823a0b78534d9a472c
SHA256385c0ce63d74f242e588785b8b05f46a66beb6b12a32ba9ed44ce1fd0b499155
SHA51230315d91013a02a97b8cfd8772c789fbe2d007188f3dc6bbb4c0809b78d28dc07e603d58d56663fa75d8d43b804c5d2e3f10d9c750a2957ce6a83205ed0f694c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD566c5289ddcd0d90a31e24c456436972f
SHA18992d77c1a85586bb100555d01f52d6ff4f71558
SHA2563da029ad1d12b67b3679b2757dc7c7a8a06edf1af868d0aab52d14a70d31c53b
SHA512d01c83ff9b628b04acc855e2bcccd9a2cfa9ef4c22fb7bae0505207b53b40c8a791480847e38a7871e4a4ec0279f5880a1740954e35a3fafa12619758c8b838c