Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
0e9cce56164dd4a5b2e7206025ff181a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e9cce56164dd4a5b2e7206025ff181a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0e9cce56164dd4a5b2e7206025ff181a_JaffaCakes118.html
-
Size
52KB
-
MD5
0e9cce56164dd4a5b2e7206025ff181a
-
SHA1
0e1ed4486b36d4c69f143ed1491752bced9d4e32
-
SHA256
90a5ae90c92a28a312e638502792cdfb4c7a44a0abd675944c8ea9deb4aa3486
-
SHA512
d5678660f68a265901d1209fab20210770cba8630ba3949fa117ace6155104dd5f07152db006fdefab0020eb3866a642614e8729df3743eed6d1a8ee55ca53ab
-
SSDEEP
1536:Xk1U3goF92QoCeTlXcfq0ToqWt5iCGvmNvm:UC3goF9wCeTeq0ToqWt5iCGvL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 3484 msedge.exe 3484 msedge.exe 3984 identity_helper.exe 3984 identity_helper.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2316 3484 msedge.exe 85 PID 3484 wrote to memory of 2316 3484 msedge.exe 85 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 3068 3484 msedge.exe 86 PID 3484 wrote to memory of 1636 3484 msedge.exe 87 PID 3484 wrote to memory of 1636 3484 msedge.exe 87 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88 PID 3484 wrote to memory of 1956 3484 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0e9cce56164dd4a5b2e7206025ff181a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc923546f8,0x7ffc92354708,0x7ffc923547182⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6152 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13092552477728509584,16875919181793105271,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD526822ae8fb5fe50d0fce8d7b77d4b2de
SHA15a265da27285dedd8973cbc683df38f2d3e64530
SHA256a7b38961b11f43751b06dd3920e61b581eb19d852dcff0819cdfe3c41dbb963d
SHA512c698b62175b9691ef3ad4b01522200cc621b11803b39b3819ac9ac82d7814b95edb3810fe8879498de95f2ef729195eed25f6024aa9aa704bc35b36b78af0b45
-
Filesize
858B
MD5040451c6d654ef67dee90f67de500c88
SHA169fb488cfa04cbc359af14a7f1b9ccde2d92381f
SHA25672bf04207ccd0fb79aa15295e8467cf75f28a9bf9b7d418cd7c2015fb617f979
SHA512f8f179851ad80ff25d1e359caef48613aba4148573521c07910b627abe0c7f1c934890cfde874e847a692538b2f4689ea0c4e1577e4dc5c98308e6ba77f6ceb3
-
Filesize
5KB
MD58454f46632e110797b711c8be9e1b137
SHA14742abf5d2dc8898382e0d442796e2158354abab
SHA25697ab45c446b4c46fa2143a3c17cdb1996c7dd75c8d77547808770673e9568ccf
SHA5128e372c52df6a83cf837552cc0557fa7b5f742c6378957728ba75fbbabb9030442951f2761fa66b4c6c7d5e1b27bfec17df06678d18c84cf1ac057b229c22119e
-
Filesize
6KB
MD52a6928b4fb42ab77e6a7427fc5f12bc3
SHA137b280e03800aa72e1f11762680d3d39fb55903f
SHA256f451f7c66599186265e92f4625c2f4c0020752ca2780f22edb35cec5baff35aa
SHA51249221871092413b53363607fe512a6013e6dfc5ba45563de3cae7d0252b82beb408990f0129c2562d51cf02d65231f330e8fd42728ecbb5bfb95ca6f24f16704
-
Filesize
6KB
MD57e3ef3ff5d5d0903ac4cc157bd8ac755
SHA1e50e678170c26ae9770e633670c747bbb91e49af
SHA256d56940af86725307fb964aceabed379220267697391588e5a1cfc735e193bc28
SHA512c5112367592d59f264903671c19e69280e61246f34a4df9f81cfd83a9f4e4e57fe9e0fef5dd1e4ef1be64a55f0d96c766bf3aab969dcc053d1c7d801ee6d623f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58fd481625049c0af34bed660e311b22f
SHA1b74de5c03403e70d691795fde6b8cd79e7528153
SHA2562c996456cf6690ebad4ded988d72675f2e77bb7bb4fa5a8890ed327e5aa8cd70
SHA512aba8319541606ecf6fb7d4430b9bf92ffb21f3e37d8fc2d630d558cb29adb737150f4c1d3274eda4eaca7a13433fdcf9dccad92815105be64e3e718c36889c55