Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
0ea704efdc395cc3b7918c71e9e340cb_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0ea704efdc395cc3b7918c71e9e340cb_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ea704efdc395cc3b7918c71e9e340cb_JaffaCakes118.html
-
Size
175KB
-
MD5
0ea704efdc395cc3b7918c71e9e340cb
-
SHA1
23e65493819201061c44322a09b4763996270123
-
SHA256
8397125f5d9d37055d409d1172bff5ccf030e4b2924eda0f291e2b6f57810269
-
SHA512
2c5a25145ce27c81af746c1ba10dc81abae6780e58f8a8a3e9d0a81d8ff70ada46f0fc90553203fe5cca47061fb5e9e1ed4c8369fa7e8fecb097a52a77078f32
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3mGNkFmYfBCJisB+aeTH+WK/Lf1/hmnVSV:SOoT3m/FvBCJi1m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4496 msedge.exe 4496 msedge.exe 1448 identity_helper.exe 1448 identity_helper.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4620 4496 msedge.exe 84 PID 4496 wrote to memory of 4620 4496 msedge.exe 84 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 404 4496 msedge.exe 85 PID 4496 wrote to memory of 4904 4496 msedge.exe 86 PID 4496 wrote to memory of 4904 4496 msedge.exe 86 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87 PID 4496 wrote to memory of 2512 4496 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0ea704efdc395cc3b7918c71e9e340cb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e61746f8,0x7ff9e6174708,0x7ff9e61747182⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15038221771396540464,518555730973041122,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD50a4ae9326a2019be84cc4b8c71978dc1
SHA15d226bc90e7eacbd2fce036def63633800a003e7
SHA256248efaede7d7e7bb1920c95e6dba56f6f2950f174c2b212d80316fd64fad2e9e
SHA5124cbed6909a7d44bf0d71c35fc738cdb0bc355afa07cc3afb733a599a040c80df807349e2ea849fc99ec5031f48a7dbf547a98d0e8cc72b0ca51fced5f072d321
-
Filesize
2KB
MD5ebb6782cf3817a8a4da317957228c1a0
SHA1aeca2bd1c8b0a0193cd75289afa9d52ea7182539
SHA2561f835ba6f00f68f70329d9776a4ee61980adc02620c0b952d3a4361acdb08cc6
SHA512d936267a1b5dfeb6500cf050ce40aaa2a9a8e302b4902058a15a767589a3a9e055cb0972f010eabf1c54b8c08331fc9827287bbe5b4f5f8efe34fa2e1b143853
-
Filesize
2KB
MD57501a3d50aade34244df9b9f314929ff
SHA1cddaeed7d6a4102405f343b58fdbed1157f39d2d
SHA256e1fba3342653b01ed4f3a45dd0b192c2dcf1688e1ce13cc532ae85e2e6eb9c44
SHA51285a847db0b98e65f6f185c12cdbe17a239d0e647b4df9e5f9baf6c295c4340bef980d1c93eece1c8912c204e4654bc7faee518536b792563669f6bfed4494d8f
-
Filesize
5KB
MD557143846c7c218ef42f33ed1d3ae79fc
SHA1b7dc98f0feae48a733a9c4d55ec794f92fe5584b
SHA2560a6e89e1911246973d73d70d9d3cba75506ae9a5e8014ac387b0eb59132459e3
SHA51284da799f105f42ee4330921c625ba5725a0f0a7a0f86fbf0ce97bc23c80cd8d8ffad18766609a09315d436896c7957ceae3898dc4eea21f5116898c32f119a84
-
Filesize
7KB
MD5cb1dcfa3d06f93c7231a6320759a0421
SHA1b03e6aaec994e3cf4f8dc423d0ef9f8c093e42d3
SHA2561dfdddc0373d7ab0c452b6cbc6c8161a3c512605859558d50fd968dd8be2cb13
SHA51274ec8bd951b897be2ab53aef848671b09eac430d237dfb4ba8550c7ac46d44c2f0908c2e881cafda1a0724c1e40f33765aa3a7868d257f61dcaf00e16b9c27b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b69c9d645bdfce33cc47e4e225338421
SHA1d23b04daccc4eddc87e8aaaf55112e019944c96f
SHA256889a89ddf34eb4f06d6e0ab1323744c12f45cf4849d5e71ad4778cbf6b6c14b9
SHA512ed3549777a5180ed8556142fff985ce9eb583d40de571da5d77b7ef78651fe3108ae0d59c66376b9d6987b54f93f98b46ffbb8324a49f0c0bd29456651a4f8aa